Analysis
-
max time kernel
22s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe
Resource
win10v2004-20221111-en
General
-
Target
12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe
-
Size
456KB
-
MD5
059af5b26ac60c50f7a919064bbeba8c
-
SHA1
8130b46634aec48c54c1bb6d06582f92746adc5b
-
SHA256
12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b
-
SHA512
cdd4afdfb677f029bd71ea52a21808e16369ad9332d1bd8e50b3ebf1b33cdeaf9cb4b3bed063975a9fedac66c991f8941d8413802e23ea35d1b6142f88233758
-
SSDEEP
3072:4tZYmy5Jk7dRz1iASs/rYo752KsCp7a/EliKxfJkxbPL1dypZQaSJVr+1O/:eYmy5JmRz1iAJByGxw1dy7QaSDrY
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1556 cmd.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmd.exedescription ioc process File opened (read-only) \??\D: cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exepid process 1928 12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.execmd.exedescription pid process target process PID 1928 wrote to memory of 1556 1928 12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe cmd.exe PID 1928 wrote to memory of 1556 1928 12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe cmd.exe PID 1928 wrote to memory of 1556 1928 12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe cmd.exe PID 1928 wrote to memory of 1556 1928 12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe cmd.exe PID 1556 wrote to memory of 1452 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 1452 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 1452 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 1452 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 1744 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 1744 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 1744 1556 cmd.exe PING.EXE PID 1556 wrote to memory of 1744 1556 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe"C:\Users\Admin\AppData\Local\Temp\12bf0ffad64011452112e5825f9161e6b79479c39e0f9b15daad5937d43f8f0b.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\\MoveFile.bat2⤵
- Deletes itself
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\PING.EXEping -a 127.13⤵
- Runs ping.exe
PID:1452 -
C:\Windows\SysWOW64\PING.EXEping 127.13⤵
- Runs ping.exe
PID:1744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339B
MD5c8521b781ceb07f2d798b6a915a4f687
SHA13a97eedea8620d08c117027ce9192bd3e4bbb27d
SHA256ce39e0f34714e2deaec3acf7377cce6ed536ae425172988c3e4c7dd5a47aec21
SHA512286215702f860fe4ca2aa9329c9e40aa77c8b4b75b627f8bf6f42da1e923b8d70408235e9428a22aca6c3e82db4f0fd7357889ab5b02e82ad0bded8d16e01b9e