Analysis
-
max time kernel
86s -
max time network
87s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe
-
Size
53KB
-
MD5
0d596a2483431c9f6ef96323956345c8
-
SHA1
f3b27081476e768b3076611feb3a90d6925f5a32
-
SHA256
c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2
-
SHA512
52b9169b878c22db1a95465e8275f86fc34e148155b3af6732c86470936f574ec1c61d2bf685767e742f334e099aeab4cf7789f961c25a63dbf4d36e2d420e02
-
SSDEEP
768:fW5i5fm4vVLnlFDEZ80sprqSw/ZHOBFoSEWbDI41M8uF+Uqkcr:yinxlFD10YWSw/ZHOBFCoDIkLd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1988 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\663512826 = "C:\\Users\\Admin\\663512826.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe Token: SeShutdownPrivilege 2024 shutdown.exe Token: SeRemoteShutdownPrivilege 2024 shutdown.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2040 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 27 PID 1520 wrote to memory of 2040 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 27 PID 1520 wrote to memory of 2040 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 27 PID 1520 wrote to memory of 2040 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 27 PID 2040 wrote to memory of 1724 2040 cMd.exE 29 PID 2040 wrote to memory of 1724 2040 cMd.exE 29 PID 2040 wrote to memory of 1724 2040 cMd.exE 29 PID 2040 wrote to memory of 1724 2040 cMd.exE 29 PID 1520 wrote to memory of 2024 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 30 PID 1520 wrote to memory of 2024 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 30 PID 1520 wrote to memory of 2024 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 30 PID 1520 wrote to memory of 2024 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 30 PID 1520 wrote to memory of 1988 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 32 PID 1520 wrote to memory of 1988 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 32 PID 1520 wrote to memory of 1988 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 32 PID 1520 wrote to memory of 1988 1520 c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe"C:\Users\Admin\AppData\Local\Temp\c64bfeb7e6e641f7c11d8dd08914710df0282b5b7cb2ef26772cdf5a2abe23d2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cMd.exEcMd.exE /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 663512826 /t REG_SZ /d "%userprofile%\663512826.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 663512826 /t REG_SZ /d "C:\Users\Admin\663512826.exe" /f3⤵
- Adds Run key to start application
PID:1724
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C64BFE~1.EXE > nul2⤵
- Deletes itself
PID:1988
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1344
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1496