Analysis
-
max time kernel
283s -
max time network
300s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:44
Static task
static1
Behavioral task
behavioral1
Sample
54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe
Resource
win10v2004-20221111-en
General
-
Target
54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe
-
Size
566KB
-
MD5
e5e2c8370e3b5cb28012034c0de3d411
-
SHA1
c36335f3d5cfc1e07eb9c05950055220dff6742d
-
SHA256
54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33
-
SHA512
130e1fa6a6a21614a2be90c661b3a525eb828d904bf16a6fe6878c570bd4f165a0cb8ed73e667018632fa896e6bd73bbe04e31a81ae3bab57e0b0dfe27a68f4d
-
SSDEEP
12288:jQH1BpaanPdSVXe+GP9YqCyf3IwjkG2hXwMnn20:jSBkan1SRZGP9YqCyQwjkTXwH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exepid process 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exedescription pid process Token: SeDebugPrivilege 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exedescription pid process target process PID 4752 wrote to memory of 4828 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 4828 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 5048 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 5048 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 2744 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 2744 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 4736 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 4736 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 3408 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe PID 4752 wrote to memory of 3408 4752 54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe"C:\Users\Admin\AppData\Local\Temp\54e7c39588ef0e402d7d0669ba91a92338153d336b37e37785cbe13980fe3c33.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:4828
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:3408
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:4736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:5048
-