Analysis
-
max time kernel
188s -
max time network
228s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 09:49
Static task
static1
Behavioral task
behavioral1
Sample
62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe
Resource
win10v2004-20221111-en
General
-
Target
62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe
-
Size
137KB
-
MD5
4f561486c4a8bda8acdc2edbc2d84e30
-
SHA1
e23918de3c54b8515bd6f6ae974b5bc1e00f8588
-
SHA256
62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202
-
SHA512
08f72b8fb0980e610bd910001663aa9f04fbcf22f984f7ee09cadfeaef3acae090c708ba817fd240802c42bdde01fbefd4081bca58e6a76c6a82efcaf978bafd
-
SSDEEP
3072:xp6FfBpfGCAKH7z9rrMcIENFTSGXwjxPuejNhNuO4:/6dBZGCAKbzx3foGXwU82
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winver.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\3BCFB654 = "C:\\Users\\Admin\\AppData\\Roaming\\3BCFB654\\bin.exe" winver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\3BCFB654 = "C:\\Users\\Admin\\AppData\\Roaming\\3BCFB654\\bin.exe" winver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
winver.exepid process 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe 1676 winver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Explorer.EXEdescription pid process Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winver.exepid process 1676 winver.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exewinver.exedescription pid process target process PID 1908 wrote to memory of 1676 1908 62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe winver.exe PID 1908 wrote to memory of 1676 1908 62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe winver.exe PID 1908 wrote to memory of 1676 1908 62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe winver.exe PID 1908 wrote to memory of 1676 1908 62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe winver.exe PID 1908 wrote to memory of 1676 1908 62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe winver.exe PID 1676 wrote to memory of 1200 1676 winver.exe Explorer.EXE PID 1676 wrote to memory of 1120 1676 winver.exe taskhost.exe PID 1676 wrote to memory of 1164 1676 winver.exe Dwm.exe PID 1676 wrote to memory of 1200 1676 winver.exe Explorer.EXE PID 1676 wrote to memory of 1908 1676 winver.exe 62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe"C:\Users\Admin\AppData\Local\Temp\62895e4b8963035e1d4bf2dd0733c84a63fb76196105edbd6b37f33b101c9202.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\winver.exewinver2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1676
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1120