Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe
Resource
win10v2004-20220812-en
General
-
Target
3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe
-
Size
148KB
-
MD5
93de31f7b241689cbd57d7e9eda72640
-
SHA1
9b344f38e3114ec67de47854214b9f98f3bbe2cc
-
SHA256
3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8
-
SHA512
3383758d1fa8ed30fdcf2582361894ca31b557b0a94ad31c4182a9a3fa0b9258f22b8ca3b0dd2d5d29aa42a099129f73100b48b97c2c7e0cc85d130af501776e
-
SSDEEP
3072:o3k5lS8NQ7GsRwNqmAlITlU4Q+SparIKxO4W2hR:o1GsOFA+o+SpEIKxOZ
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 432 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 432 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 896 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 896 wrote to memory of 1936 896 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe 29 PID 896 wrote to memory of 1936 896 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe 29 PID 896 wrote to memory of 1936 896 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe 29 PID 896 wrote to memory of 1936 896 3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe 29 PID 1936 wrote to memory of 432 1936 cmd.exe 31 PID 1936 wrote to memory of 432 1936 cmd.exe 31 PID 1936 wrote to memory of 432 1936 cmd.exe 31 PID 1936 wrote to memory of 432 1936 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe"C:\Users\Admin\AppData\Local\Temp\3898184831b3cda139a0bc876ea04592333577bed78fb0fea0eedc56b5c429c8.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 3898184831b3cda139a0bc876ea04592332⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-