Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30-10-2022 18:52
Static task
static1
Behavioral task
behavioral1
Sample
784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe
Resource
win10v2004-20220901-en
General
-
Target
784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe
-
Size
32KB
-
MD5
81b9dd4f7928488b0961580b86064bd0
-
SHA1
e76736d1a1b668872a8dc3239ee2c89d2e37f12c
-
SHA256
784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f
-
SHA512
f00200a692044b5ac697420fbf4e72e5b09e52810baaf1f5a1c2a35f0d57682246f3c6996e707e7caac35dcb583dd8e5a41b4f9e0690d4afc3227dbed86e08db
-
SSDEEP
384:03dEZNHUX5OK5l6ZVUESCssOJvy6JB7Ep5qq+FnfjkTYYyqdCN+Or551:0NEZJ+5mUZCspqp5XojEYYyJ+s5H
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1272 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1208 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1208 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1352 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1272 1352 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe 27 PID 1352 wrote to memory of 1272 1352 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe 27 PID 1352 wrote to memory of 1272 1352 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe 27 PID 1352 wrote to memory of 1272 1352 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe 27 PID 1272 wrote to memory of 1208 1272 cmd.exe 29 PID 1272 wrote to memory of 1208 1272 cmd.exe 29 PID 1272 wrote to memory of 1208 1272 cmd.exe 29 PID 1272 wrote to memory of 1208 1272 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe"C:\Users\Admin\AppData\Local\Temp\784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 784b39d8c99a152c80f5204b3703802057567f441fb58aaaaadd9ed3e628e74f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-