Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win7-20220901-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Trojan-Ransom.Win32.Blocker.exe
Resource
win10v2004-20220901-en
2 signatures
150 seconds
General
-
Target
Trojan-Ransom.Win32.Blocker.exe
-
Size
298KB
-
MD5
64a213db984a605dce653c6c69eb9535
-
SHA1
7cb7f3b63231247ef65c7aa2a481d5e737b787e2
-
SHA256
52c43d13e98f04db173c9c5cd47e619a9fcbbafd54fafeb02dec51edcf1aabf4
-
SHA512
b744e7f6242de4c875ae981c623e05edf3bfe16a1e856a2339725f31867bb57c718cf51bee7d2c13614ff4a9531a70ac506d500ff068ef7b1cc7e3dd0a84652f
-
SSDEEP
3072:EFmKwW7uC80JyxpAf/hYr9+RfYYbQHXS9ih3ijZywh7f3x+:0ee8BpC5bQ3SOYB7fI
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe System Incorporated = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Adobe\\Reader_sl.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Nctstf = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\Nctstf.exe" notepad.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\D: notepad.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1380 set thread context of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1380 Trojan-Ransom.Win32.Blocker.exe 1380 Trojan-Ransom.Win32.Blocker.exe 544 svchost.exe 536 Trojan-Ransom.Win32.Blocker.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1380 Trojan-Ransom.Win32.Blocker.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 536 Trojan-Ransom.Win32.Blocker.exe Token: SeDebugPrivilege 544 svchost.exe Token: SeDebugPrivilege 980 calc.exe Token: SeDebugPrivilege 1116 notepad.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1380 wrote to memory of 980 1380 Trojan-Ransom.Win32.Blocker.exe 27 PID 1380 wrote to memory of 544 1380 Trojan-Ransom.Win32.Blocker.exe 28 PID 1380 wrote to memory of 544 1380 Trojan-Ransom.Win32.Blocker.exe 28 PID 1380 wrote to memory of 544 1380 Trojan-Ransom.Win32.Blocker.exe 28 PID 1380 wrote to memory of 980 1380 Trojan-Ransom.Win32.Blocker.exe 27 PID 1380 wrote to memory of 980 1380 Trojan-Ransom.Win32.Blocker.exe 27 PID 1380 wrote to memory of 544 1380 Trojan-Ransom.Win32.Blocker.exe 28 PID 1380 wrote to memory of 980 1380 Trojan-Ransom.Win32.Blocker.exe 27 PID 1380 wrote to memory of 980 1380 Trojan-Ransom.Win32.Blocker.exe 27 PID 1380 wrote to memory of 980 1380 Trojan-Ransom.Win32.Blocker.exe 27 PID 1380 wrote to memory of 544 1380 Trojan-Ransom.Win32.Blocker.exe 28 PID 544 wrote to memory of 1116 544 svchost.exe 29 PID 544 wrote to memory of 1116 544 svchost.exe 29 PID 544 wrote to memory of 1116 544 svchost.exe 29 PID 544 wrote to memory of 1116 544 svchost.exe 29 PID 544 wrote to memory of 1116 544 svchost.exe 29 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 1380 wrote to memory of 536 1380 Trojan-Ransom.Win32.Blocker.exe 30 PID 536 wrote to memory of 544 536 Trojan-Ransom.Win32.Blocker.exe 28 PID 536 wrote to memory of 544 536 Trojan-Ransom.Win32.Blocker.exe 28 PID 536 wrote to memory of 980 536 Trojan-Ransom.Win32.Blocker.exe 27 PID 536 wrote to memory of 980 536 Trojan-Ransom.Win32.Blocker.exe 27 PID 536 wrote to memory of 1116 536 Trojan-Ransom.Win32.Blocker.exe 29 PID 536 wrote to memory of 1116 536 Trojan-Ransom.Win32.Blocker.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\calc.exe"C:\Windows\SysWOW64\calc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"3⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536
-