Analysis
-
max time kernel
36s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe
Resource
win10v2004-20221111-en
General
-
Target
c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe
-
Size
137KB
-
MD5
1e8ce1d2e0a4f02af922d0f2ffa39830
-
SHA1
14d91d0e60ffe13861d867c812c25e2489e13587
-
SHA256
c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3
-
SHA512
c5abf3bffe911e6a3fb820fab53b49788cdf82ddf49521969b67087f36c6cb4f869ba8c63aa96b0e35dae15199410644ef9f2c50f42edc868dbe8385090d8ba6
-
SSDEEP
1536:Or0+D2jmrMxhzVNl5TL9FaNoPovA6jy4nO3QZNZu:4YmINl5TXwoQvA3+OgZz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 548 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1736 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 856 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 856 AUDIODG.EXE Token: 33 856 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 856 AUDIODG.EXE Token: SeDebugPrivilege 1736 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1520 c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1520 wrote to memory of 548 1520 c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe 30 PID 1520 wrote to memory of 548 1520 c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe 30 PID 1520 wrote to memory of 548 1520 c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe 30 PID 1520 wrote to memory of 548 1520 c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe 30 PID 548 wrote to memory of 1736 548 cmd.exe 32 PID 548 wrote to memory of 1736 548 cmd.exe 32 PID 548 wrote to memory of 1736 548 cmd.exe 32 PID 548 wrote to memory of 1736 548 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe"C:\Users\Admin\AppData\Local\Temp\c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del c74ef88095e75cab1dcd191ac2bba7f36a807b94911ee8ec9faa3e88a9199fc3.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5801⤵
- Suspicious use of AdjustPrivilegeToken
PID:856