Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:26
Static task
static1
Behavioral task
behavioral1
Sample
432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe
Resource
win10v2004-20221111-en
General
-
Target
432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe
-
Size
816KB
-
MD5
339e0a490454d88c80abb342555170a6
-
SHA1
0620e7238d02ff5407e2786c1d9d0dc0e36af098
-
SHA256
432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21
-
SHA512
a1f7c281cd920c52897908e741da15ff9675b0c2460ac4078bd9b4a44c30abe7afe375aa33aa41fcadfdb699529c3dbc65ffaa1c6f300efe3af704891205e1a1
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaC4GP2fZqoVqD3:7JZoQrbTFZY1iaC4FfZLc
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exedescription pid process target process PID 2580 set thread context of 4604 2580 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exedescription pid process target process PID 2580 wrote to memory of 4604 2580 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe PID 2580 wrote to memory of 4604 2580 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe PID 2580 wrote to memory of 4604 2580 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe PID 2580 wrote to memory of 4604 2580 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe PID 2580 wrote to memory of 4604 2580 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe PID 2580 wrote to memory of 4604 2580 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe PID 2580 wrote to memory of 4604 2580 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe 432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe"C:\Users\Admin\AppData\Local\Temp\432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe"C:\Users\Admin\AppData\Local\Temp\432a3c22d2235e7fe453ec76e20daa6d5e8bd308d56074b275f484a4e3a0bb21.exe"2⤵PID:4604