Analysis
-
max time kernel
24s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/11/2022, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
docker-compose.yml
Resource
win7-20220812-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
docker-compose.yml
Resource
win10v2004-20220901-en
4 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
docker-compose.yml
-
Size
455B
-
MD5
8e32359a939ad1bb8b7d7b0088fba743
-
SHA1
d75373888acb9ebd7324b4fdb3450ab7bdd56cd3
-
SHA256
7565d3c3c93a3abbd7a5632ae363c8431bf2383c8b69011fe8e7732adcc8eaa5
-
SHA512
0f44407478551431e442a8c9015871f9aaaba28beec4317780e73508177863da23a17ba218eeb9b4fd4c3df2b58eef78138f6102bcf44ef0ac3875c8fc903bf4
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 836 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 836 AUDIODG.EXE Token: 33 836 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 836 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1728 1660 cmd.exe 29 PID 1660 wrote to memory of 1728 1660 cmd.exe 29 PID 1660 wrote to memory of 1728 1660 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\docker-compose.yml1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\docker-compose.yml2⤵
- Modifies registry class
PID:1728
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1712
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x56c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:836
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1396