Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:43
Behavioral task
behavioral1
Sample
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
General
-
Target
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe
-
Size
658KB
-
MD5
6daf59a76d89f64fb9826981af1c9eda
-
SHA1
d2b6141675da414822e674f19da7b943b40a9336
-
SHA256
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a
-
SHA512
b0f489d026a2e069402ef94eac4c1e3e8784b32ecc0a8d9dafa460d63f8fc012cabea0f04b7b4e245521a0de280b2abeda3e2925081d35badac8b756c4c0f686
-
SSDEEP
12288:K9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/ho:GZ1xuVVjfFoynPaVBUR8f+kN10EB+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exedescription pid process Token: SeIncreaseQuotaPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeSecurityPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeTakeOwnershipPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeLoadDriverPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeSystemProfilePrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeSystemtimePrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeProfSingleProcessPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeIncBasePriorityPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeCreatePagefilePrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeBackupPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeRestorePrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeShutdownPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeDebugPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeSystemEnvironmentPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeChangeNotifyPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeRemoteShutdownPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeUndockPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeManageVolumePrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeImpersonatePrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: SeCreateGlobalPrivilege 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: 33 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: 34 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: 35 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe Token: 36 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exepid process 2672 a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe"C:\Users\Admin\AppData\Local\Temp\a42e611788c3daafdb6043c50295d4f02ba747b65a8c330a41650ecbab33753a.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2672