Analysis
-
max time kernel
34s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe
Resource
win10v2004-20220812-en
General
-
Target
878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe
-
Size
40KB
-
MD5
08755e1cdb40b10c2e8641b399594f80
-
SHA1
ffbf0fa0321819327715a1564473fc855ffb7569
-
SHA256
878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1
-
SHA512
e173d563956eababc43666d7f4f79f7243d5d411966d355d3c3fb7f421ff3dab443317c21c793c163a08b9e4dd42598f541386443efecdd61e2afbcd5c289108
-
SSDEEP
768:X2o5KRVtxy16D/t4AM0aIbwbNA5wSc2J:mRRVtxS6JwtuJ
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1020 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1020 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 784 878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 784 wrote to memory of 1252 784 878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe 27 PID 784 wrote to memory of 1252 784 878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe 27 PID 784 wrote to memory of 1252 784 878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe 27 PID 784 wrote to memory of 1252 784 878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe 27 PID 1252 wrote to memory of 1020 1252 cmd.exe 29 PID 1252 wrote to memory of 1020 1252 cmd.exe 29 PID 1252 wrote to memory of 1020 1252 cmd.exe 29 PID 1252 wrote to memory of 1020 1252 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe"C:\Users\Admin\AppData\Local\Temp\878cbd7eb23c7130fb80f15535fb98877b1e35137e7010e7fdc99b577c65a8a1.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 878cbd7eb23c7130fb80f15535fb98877b2⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-