Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 18:28
Static task
static1
Behavioral task
behavioral1
Sample
89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe
Resource
win10v2004-20220812-en
General
-
Target
89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe
-
Size
140KB
-
MD5
81be1f3b55a6b6b259c358e4c7481040
-
SHA1
9c7f2b873be74628cf53d93c3707a80f001e5e19
-
SHA256
89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24
-
SHA512
3a25774646ef5b8b3b1b3930ea87942cb91fa065e568932a6fb38a961dbcc4869bb1f9de55146ebdfda41e9d442ca2f29d3adf97a7116adf279420d973af4f95
-
SSDEEP
1536:SKT/M+M6n0ZbvNTDXqLSsNP0Y/eTuXGRDefe8NtT3O3HMgAbHJatLG5uxJX620tH:BTCRjXOp/3e8XjUsgwHJ6LGkHXsH
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 968 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 968 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 900 89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 900 wrote to memory of 324 900 89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe 29 PID 900 wrote to memory of 324 900 89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe 29 PID 900 wrote to memory of 324 900 89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe 29 PID 900 wrote to memory of 324 900 89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe 29 PID 324 wrote to memory of 968 324 cmd.exe 31 PID 324 wrote to memory of 968 324 cmd.exe 31 PID 324 wrote to memory of 968 324 cmd.exe 31 PID 324 wrote to memory of 968 324 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe"C:\Users\Admin\AppData\Local\Temp\89a84bd692b13ec7cbb5294f4ef6479b91fe93270414ce126682bd6e88cbdc24.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 89a84bd692b13ec7cbb5294f4ef6479b912⤵
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-