Analysis
-
max time kernel
44s -
max time network
70s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 23:41
Static task
static1
Behavioral task
behavioral1
Sample
65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe
Resource
win10v2004-20220812-en
General
-
Target
65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe
-
Size
186KB
-
MD5
836ca8dc17f8da694ea736611f2cbb10
-
SHA1
8c6d5e929b4231ddda22635acddb44e842df9382
-
SHA256
65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49
-
SHA512
a2d09654a0631deedd110a878b4e514d6494784eb24133eba4e3e9b1f93acbcc9503d2e55222280740e063f80c548cbb7e46fc3639d27c97b48cf66630521b1e
-
SSDEEP
3072:DDzwcnj7u7rVWikKUsOtQHS1KbF7mQM+Hbs+RoZtnsB7/bw/lYuUysQ0+YC8OHwn:DDzwcnj67bOwS1K57mQMfaoZtnywNYuS
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard\Extension = ".vcf" 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wab 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\ = "vcard_wab_auto_file" 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\Content Type = "text/x-vcard" 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\ = "vCard File" 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\" /vcard %1" 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\",1" 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1752 65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe"C:\Users\Admin\AppData\Local\Temp\65b9e40652cf625b40e298131ecb87211b8ba867091bd535786b675b11a55f49.exe"1⤵
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1752