Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 20:32
Static task
static1
Behavioral task
behavioral1
Sample
50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe
Resource
win10v2004-20220812-en
General
-
Target
50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe
-
Size
32KB
-
MD5
092573d33afb419ba3709cd9d58e3fa0
-
SHA1
072fdce290b3e66250054015e4f7192038eed2b0
-
SHA256
50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37
-
SHA512
e7bd690b722b98d2b505868c2c0db55bcface4bc06194ff2bb2d61dd34a7d4af3dc6a1fc0824a198f785fb513440a61c9e78a6fb42496e927740a299475d2986
-
SSDEEP
768:KmMAYdra3C1iE/oqR49XZhsn77EiLp9Oh:KdAYdDRVLp9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1468 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1768 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1768 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1200 50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1468 1200 50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe 28 PID 1200 wrote to memory of 1468 1200 50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe 28 PID 1200 wrote to memory of 1468 1200 50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe 28 PID 1200 wrote to memory of 1468 1200 50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe 28 PID 1468 wrote to memory of 1768 1468 cmd.exe 30 PID 1468 wrote to memory of 1768 1468 cmd.exe 30 PID 1468 wrote to memory of 1768 1468 cmd.exe 30 PID 1468 wrote to memory of 1768 1468 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe"C:\Users\Admin\AppData\Local\Temp\50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 50c6c46ce108182272c81aea7de7c806a8e3bfae9a9cfd4ab87cdf83d5c42b37.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-