Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe
Resource
win10v2004-20220901-en
General
-
Target
c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe
-
Size
85KB
-
MD5
843bb4bf71d8cb81a9222f9a1653dd81
-
SHA1
b517e6ae8c806d75a9652a40484392c73de14c5e
-
SHA256
c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957
-
SHA512
e28c1c2baf35b2333513dcf62e51fe45211d5f69cfe26217d7fad95542ba884a81c3821d339d5a3b3731687a0c8f87b99b02a829c81eb42231fe8e78be3956ff
-
SSDEEP
1536:v6tLTUdt0v09m23CDj7+STN05xiSLRs4m8:StLYdt08m23M7+6GD3l
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1732 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1732 1632 c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe 28 PID 1632 wrote to memory of 1732 1632 c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe 28 PID 1632 wrote to memory of 1732 1632 c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe 28 PID 1632 wrote to memory of 1732 1632 c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe 28 PID 1632 wrote to memory of 1732 1632 c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe 28 PID 1632 wrote to memory of 1732 1632 c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe 28 PID 1632 wrote to memory of 1732 1632 c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe"C:\Users\Admin\AppData\Local\Temp\c89b1b8c7678fd19f82c8f6169517d29aea5d8de1dac14f30e5e79ba178ad957.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Sxb..bat" > nul 2> nul2⤵
- Deletes itself
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5fa8cbbd05f6e1cb4900bf529a883e4a2
SHA13679bcae593c53a6fd4d44911cbec87bcf06f980
SHA256a22149562f00e2415e24b1ef7c02b8a9544f850c209c3efb3268204ad8069178
SHA51256c5eae2b589e3bf2b28d042f4d45ceab12ce56799862ab3871d47a455529bf06ff8957ea34ac7a89da0d593e1cf1a3310bbcceb036efa79d5b0cbcc51eb372f