Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 18:52
Static task
static1
Behavioral task
behavioral1
Sample
dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe
Resource
win10v2004-20220812-en
General
-
Target
dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe
-
Size
104KB
-
MD5
82a8b6ae09903787a41ad6457a2d6e10
-
SHA1
d1b0b84e91907939d758aac688dbee7d76393abb
-
SHA256
dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f
-
SHA512
e1ca64a17668a05b29f9806d4f5769af52f6f56666a3a6140b2c63c2dd23f55fd8af4eafce5da299aea449af90c667959bc0f2256b6c37f595018a604ebe9b9a
-
SSDEEP
1536:XIxb38MhDn2f+iHvnL6yId2xdMGfR9TQ2g8cifaxK2jd3psK/OV16PZdpM2Kczgm:7GiPnL6K7f3ixF2o9RH5BbtqHMOq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1680 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 896 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 896 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1336 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1336 wrote to memory of 1680 1336 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe 29 PID 1336 wrote to memory of 1680 1336 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe 29 PID 1336 wrote to memory of 1680 1336 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe 29 PID 1336 wrote to memory of 1680 1336 dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe 29 PID 1680 wrote to memory of 896 1680 cmd.exe 31 PID 1680 wrote to memory of 896 1680 cmd.exe 31 PID 1680 wrote to memory of 896 1680 cmd.exe 31 PID 1680 wrote to memory of 896 1680 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe"C:\Users\Admin\AppData\Local\Temp\dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del dcac06d54ceb3923390d0337d1b09bc41bf20c973b6134ac6ed41da98295e90f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-