Analysis
-
max time kernel
39s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe
Resource
win10v2004-20220812-en
General
-
Target
3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe
-
Size
74KB
-
MD5
0f16cdacb0160f7b6c73878d97857ef0
-
SHA1
e6734f3764be0c3f4fb404de22032a2745c62a09
-
SHA256
3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571
-
SHA512
935a6a4c73fc16375a2873979149a5c4ec38be20bcb7c16b655759b6e03672d43c6a7c93e577060fdad9d1c7df818636fae870f6fb222c3b85cbb77c832117cd
-
SSDEEP
768:5LLJm2DBTClcALYUP1Dpx0pcTV6oIqC9tw2jOalQ:hLY7cALDPdp6CC9tLQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 700 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1764 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1764 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1148 3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1148 wrote to memory of 700 1148 3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe 28 PID 1148 wrote to memory of 700 1148 3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe 28 PID 1148 wrote to memory of 700 1148 3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe 28 PID 1148 wrote to memory of 700 1148 3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe 28 PID 700 wrote to memory of 1764 700 cmd.exe 30 PID 700 wrote to memory of 1764 700 cmd.exe 30 PID 700 wrote to memory of 1764 700 cmd.exe 30 PID 700 wrote to memory of 1764 700 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe"C:\Users\Admin\AppData\Local\Temp\3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 3a11b3665b31adb0a59db0303f604e4b20400dcdd3d1d25b76fa247bcca00571.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-