Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/11/2022, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe
Resource
win10v2004-20220901-en
General
-
Target
a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe
-
Size
2.2MB
-
MD5
ec9e29c8330e717ccaf7e11f6baf6f22
-
SHA1
d9224cf44dba1aad3fb633407bc17dc4776ae0ab
-
SHA256
a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b
-
SHA512
e518397710109673dab7d79b87d55b55e271a0642f7007a682decff42b47e3f01f98999ac457b1fb28ed67a9cab07f7b54ddff95d8786cc0bc7f79eeb8bd57d3
-
SSDEEP
49152:jB3S17FKwAVikABu3YREjcdaO1mezjsQXVMURB3SvaA8vZ9AT2+:dIKRi1BuoREjkaKaQXaUfGwvZU2+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1972 1896 a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe 28 PID 1896 wrote to memory of 1972 1896 a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe 28 PID 1896 wrote to memory of 1972 1896 a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe 28 PID 1896 wrote to memory of 1972 1896 a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe 28 PID 1896 wrote to memory of 1972 1896 a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe 28 PID 1896 wrote to memory of 1972 1896 a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe 28 PID 1896 wrote to memory of 1972 1896 a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe 28 PID 1972 wrote to memory of 1208 1972 cmd.exe 30 PID 1972 wrote to memory of 1208 1972 cmd.exe 30 PID 1972 wrote to memory of 1208 1972 cmd.exe 30 PID 1972 wrote to memory of 1208 1972 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe"C:\Users\Admin\AppData\Local\Temp\a4915b0db0d400666c090dad1a6e9c81e3942834e07f0b53541c7f460762f04b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" ECHO ªbªw╕╦º╣ª¿½eñ┼├÷│¼╡°╡ííAº╣ª¿½ß╖"3⤵PID:1208
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5032844b360340dceee46dc61404b0c25
SHA1f2ecd23e8af44426d2a3bc056953e2f367d91443
SHA256522799f16c3ccc3d2b5337b8f50c076d1b341a218ba0e736e29e0661a57b59fa
SHA512e375285c996ceb4a755ca47bb7d4557fce5e5d93fb15816dcfcf02e0e3cdfcea8a63ccb410407d082a792f736d55d83ef75d831a2fa5877cb4183d7f943cf915