Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 20:24
Static task
static1
Behavioral task
behavioral1
Sample
ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe
Resource
win10v2004-20220812-en
General
-
Target
ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe
-
Size
100KB
-
MD5
0f2683a61828e596d8056e4444b918e0
-
SHA1
c5bfc7dd231b9e455e638a0f794cd0828c4284a5
-
SHA256
ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9
-
SHA512
e6e5aa0ca448ab5c43818d7fbfd0f15f34a3d8cc41338f21e639f2f079afd03a411cd8fcbaf435e2ea8f2d145b43d1bf24a36f7d4d5970048cbf03b3f4f76fc9
-
SSDEEP
1536:d2uJzWFivWgCTESNx0ksS+wfPHunFl8D1B:7pqivWgCT9Y8D1
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1316 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1316 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1696 ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1696 wrote to memory of 1668 1696 ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe 28 PID 1696 wrote to memory of 1668 1696 ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe 28 PID 1696 wrote to memory of 1668 1696 ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe 28 PID 1696 wrote to memory of 1668 1696 ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe 28 PID 1668 wrote to memory of 1316 1668 cmd.exe 30 PID 1668 wrote to memory of 1316 1668 cmd.exe 30 PID 1668 wrote to memory of 1316 1668 cmd.exe 30 PID 1668 wrote to memory of 1316 1668 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe"C:\Users\Admin\AppData\Local\Temp\ba4b654c3c5e50d42bb8caab39e80a32da6a30a50de4cc232720406bb644ddb9.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del ba4b654c3c5e50d42bb8caab39e80a32da2⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-