Analysis
-
max time kernel
39s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe
Resource
win10v2004-20220812-en
General
-
Target
3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe
-
Size
64KB
-
MD5
0d6e2991969a178a9f9ee5c2e05d30c0
-
SHA1
3c32904ca7840fa42b7b6f81b84525673a81872d
-
SHA256
3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313
-
SHA512
719179b4e335d7f7136ff5bb36a7b57a598995784b4b0767450ab961d519d5492086e78d0fe677eac9b5cc8ddc9e956e94ae10f4a260afd9e3680906a25e81e9
-
SSDEEP
768:F6oQ+7PMXXZ1tX5qsi+cTsa9+E+J1fVklD9uJmLzHzq:FJQ+7EXrqsiL1d+J1tkTK2Tq
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 268 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1064 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1064 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1712 3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1712 wrote to memory of 268 1712 3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe 29 PID 1712 wrote to memory of 268 1712 3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe 29 PID 1712 wrote to memory of 268 1712 3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe 29 PID 1712 wrote to memory of 268 1712 3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe 29 PID 268 wrote to memory of 1064 268 cmd.exe 31 PID 268 wrote to memory of 1064 268 cmd.exe 31 PID 268 wrote to memory of 1064 268 cmd.exe 31 PID 268 wrote to memory of 1064 268 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe"C:\Users\Admin\AppData\Local\Temp\3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 3c6be91fb37c06b4fc236627d329ec64315f925d823bc7ee2b3d7d83e6dd6313.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-