Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 15:08
Static task
static1
Behavioral task
behavioral1
Sample
8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe
Resource
win10v2004-20220812-en
General
-
Target
8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe
-
Size
92KB
-
MD5
06c15949a5e59bd2e954d131e946c5bd
-
SHA1
2e639bb4deb2f854f3bea3b5bf303b5b80acb68f
-
SHA256
8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab
-
SHA512
8ef51d01616b92866c2a58201e627f4b9c930aba3c3de95548d444082323cd7d8e8c23168ff975b2f4378c47a34fc00359ef5725120df5660a0d8856768cf533
-
SSDEEP
768:4mp1D5+8+yyCExggbX4xyhKpDq3y5qimSr4CsDqel30JbP6XTI3WoUUZ+IcnR7S:4CD5ePN4xye033tDj8r6XEJTc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 900 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 900 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2016 8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe 2016 8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1752 2016 8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe 28 PID 2016 wrote to memory of 1752 2016 8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe 28 PID 2016 wrote to memory of 1752 2016 8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe 28 PID 2016 wrote to memory of 1752 2016 8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe 28 PID 1752 wrote to memory of 900 1752 cmd.exe 30 PID 1752 wrote to memory of 900 1752 cmd.exe 30 PID 1752 wrote to memory of 900 1752 cmd.exe 30 PID 1752 wrote to memory of 900 1752 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe"C:\Users\Admin\AppData\Local\Temp\8c26d59fd197f334de3f6590c53d35ddc037eba32cc723390e5327016d88bbab.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 8c26d59fd197f334de3f6590c53d35ddc02⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:900
-
-