Analysis
-
max time kernel
15s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe
Resource
win10v2004-20220901-en
General
-
Target
f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe
-
Size
74KB
-
MD5
81f60de1c114bfc7e4cc154b90e243f0
-
SHA1
9fa0e56d99cd43919c512ba6cdd454979f88d841
-
SHA256
f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116
-
SHA512
651ba63f8b79dacd797f1ba18b6c0153b24722ea713ed142405865932741eb796953400cff84282697ce1720f37c762ec7a0b045bb9afc7c4ee68eb603ef665b
-
SSDEEP
768:4LLJmgEUBTClcALYUP1Dpx0pcTV6oIqCDtw2jOalew:ELYgEtcALDPdp6CCDtLl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 892 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 520 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 520 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 780 f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 780 wrote to memory of 892 780 f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe 28 PID 780 wrote to memory of 892 780 f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe 28 PID 780 wrote to memory of 892 780 f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe 28 PID 780 wrote to memory of 892 780 f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe 28 PID 892 wrote to memory of 520 892 cmd.exe 30 PID 892 wrote to memory of 520 892 cmd.exe 30 PID 892 wrote to memory of 520 892 cmd.exe 30 PID 892 wrote to memory of 520 892 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe"C:\Users\Admin\AppData\Local\Temp\f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del f5f1ad4b044dbef4c6edaf83253e423d61dc684bb382dcce5d4f840857ed7116.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-