Analysis
-
max time kernel
34s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 06:00
Static task
static1
Behavioral task
behavioral1
Sample
4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe
Resource
win10v2004-20220812-en
General
-
Target
4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe
-
Size
65KB
-
MD5
83e286e273e670b2dc93a93b92714b8a
-
SHA1
af21968799d7e4edbea750738b52ef7097ea7fcd
-
SHA256
4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893
-
SHA512
f39d9bb657b535de9e6f898eb4ba561c707517f9b834fed4d6c76b7ecdab416fb6627efb81b71d2bbb5576796865aafc8fbfd4577b8a7e34634783fe5c7b3a80
-
SSDEEP
768:SYJ/HEdRbAY0iUNvevdtFeebD+Tq/QwIt0L06WRR373nMle29+I4U+2HC:SYeSn+ms+Tq/Qw106S73nMlfPNi
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1824 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 664 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 664 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 880 4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 880 wrote to memory of 1824 880 4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe 29 PID 880 wrote to memory of 1824 880 4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe 29 PID 880 wrote to memory of 1824 880 4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe 29 PID 880 wrote to memory of 1824 880 4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe 29 PID 1824 wrote to memory of 664 1824 cmd.exe 30 PID 1824 wrote to memory of 664 1824 cmd.exe 30 PID 1824 wrote to memory of 664 1824 cmd.exe 30 PID 1824 wrote to memory of 664 1824 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe"C:\Users\Admin\AppData\Local\Temp\4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 4d9b521f377840392e1b81e0d0cbc3cba213256877ea4953efa249e513b9b893.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-