Analysis

  • max time kernel
    90s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-10-2022 16:19

General

  • Target

    712857d3c0eac36b64a2e5ab96c58a4d1f2a065365ad4a2966f15c6418ff428d.exe

  • Size

    239KB

  • MD5

    51e679bffeff4bc99421f9d399287c2d

  • SHA1

    45fee9d68ca2bc6e85b53e494fb48ebf0b3b64f0

  • SHA256

    712857d3c0eac36b64a2e5ab96c58a4d1f2a065365ad4a2966f15c6418ff428d

  • SHA512

    f90caff3175d6c8f803abad1abc8d88f606a33f16fb9dff05505de0532481fb63196b1de2af90247db6f5d0bce3edd4fb0c015761a43a4b124a0172ef48011aa

  • SSDEEP

    6144:qtURCGMvaYofyhXeNWkW/DT8mIKI1jZo1fCsj:qtUJMvaYofyhON9uDrIYZj

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\712857d3c0eac36b64a2e5ab96c58a4d1f2a065365ad4a2966f15c6418ff428d.exe
    "C:\Users\Admin\AppData\Local\Temp\712857d3c0eac36b64a2e5ab96c58a4d1f2a065365ad4a2966f15c6418ff428d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Windows\SysWOW64\mstsc.exe
      mstsc.exe /migrate
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Windows\system32\mstsc.exe
        mstsc.exe /migrate
        3⤵
          PID:2264
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1028

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1664-132-0x0000000000000000-mapping.dmp

    • memory/2264-134-0x0000000000000000-mapping.dmp

    • memory/4868-133-0x0000000001000000-0x000000000105D000-memory.dmp

      Filesize

      372KB

    • memory/4868-135-0x0000000001000000-0x000000000105D000-memory.dmp

      Filesize

      372KB