Analysis
-
max time kernel
155s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:42
Static task
static1
Behavioral task
behavioral1
Sample
7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exe
Resource
win10v2004-20221111-en
General
-
Target
7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exe
-
Size
1.3MB
-
MD5
9c0de06d7175f36471e2a6f1b6c02575
-
SHA1
11cdd2ae4319679da589a27a22287606c94647f4
-
SHA256
7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f
-
SHA512
3688045782cb3da4128c2e037ad58d962d9271cc1907632d149393790ea3a74e2ad380deed68aac44e9a528b405b182ae2a7ccf9dd7f4c36b615f8f7612182ec
-
SSDEEP
12288:S0/dP4yWOmaHOk30CbQqO8ThGkQai+5sy4kB/w:S8wk739skQai+G7ow
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exepid process 588 7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exedescription pid process Token: SeDebugPrivilege 588 7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exe"C:\Users\Admin\AppData\Local\Temp\7237b2e0ffecd260704e5a46887fcee2b65867dedb452a6fa8ce4904cd6abe4f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588