Analysis
-
max time kernel
157s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:35
Static task
static1
Behavioral task
behavioral1
Sample
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe
Resource
win10v2004-20221111-en
General
-
Target
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe
-
Size
353KB
-
MD5
9d186618b03db67432882393ce950e87
-
SHA1
4a03415548291b7b5d4866610a9c89226eb785bf
-
SHA256
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705
-
SHA512
e12fb93ce4611e16c3824118622a5677b339b08931558a7d48cd3e54deb3d2e5d48b21f94c1bb06149a099f21e9e0386aff44a87bcedd225fd9d643523f5045c
-
SSDEEP
6144:PuEAzYW/2D8FRaRfI8lGdblxIiPcoPU+NotTItMCw/QcDQwe4IIBZ/77MSE3QVhB:VoPU+NohI3YJAQV7vP
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\Sample.lnk" 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exedescription pid process target process PID 1704 set thread context of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exepid process 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exedescription pid process Token: SeDebugPrivilege 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exedescription pid process target process PID 1704 wrote to memory of 4716 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe CMD.exe PID 1704 wrote to memory of 4716 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe CMD.exe PID 1704 wrote to memory of 4716 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe CMD.exe PID 1704 wrote to memory of 2856 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe CMD.exe PID 1704 wrote to memory of 2856 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe CMD.exe PID 1704 wrote to memory of 2856 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe CMD.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe PID 1704 wrote to memory of 1760 1704 377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe"C:\Users\Admin\AppData\Local\Temp\377ed51872352ffb689cc0e43c4b3814ac984411807a927e8b0ac1b90670e705.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\CMD.exe"CMD"2⤵PID:4716
-
C:\Windows\SysWOW64\CMD.exe"CMD"2⤵PID:2856
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\\AppLaunch.exe"2⤵PID:1760