Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:43
Behavioral task
behavioral1
Sample
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
General
-
Target
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe
-
Size
658KB
-
MD5
6daf59a76d89f64fb9826981af1c9eda
-
SHA1
d2b6141675da414822e674f19da7b943b40a9336
-
SHA256
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a
-
SHA512
b0f489d026a2e069402ef94eac4c1e3e8784b32ecc0a8d9dafa460d63f8fc012cabea0f04b7b4e245521a0de280b2abeda3e2925081d35badac8b756c4c0f686
-
SSDEEP
12288:K9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/ho:GZ1xuVVjfFoynPaVBUR8f+kN10EB+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exedescription pid process Token: SeIncreaseQuotaPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeSecurityPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeTakeOwnershipPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeLoadDriverPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeSystemProfilePrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeSystemtimePrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeProfSingleProcessPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeIncBasePriorityPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeCreatePagefilePrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeBackupPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeRestorePrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeShutdownPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeDebugPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeSystemEnvironmentPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeChangeNotifyPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeRemoteShutdownPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeUndockPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeManageVolumePrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeImpersonatePrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeCreateGlobalPrivilege 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: 33 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: 34 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: 35 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exepid process 1200 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe"C:\Users\Admin\AppData\Local\Temp\a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1200