Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:54
Static task
static1
Behavioral task
behavioral1
Sample
2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe
Resource
win10v2004-20221111-en
General
-
Target
2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe
-
Size
73KB
-
MD5
59ef6af8411561b3e00915a8a025a4b0
-
SHA1
4c2fee5a022ea558eaaf212c93c9e04c1188d44c
-
SHA256
2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40
-
SHA512
7c34003f52a328330383f0e5d20f0316abb285b9aab4d9e67ff3dd213bef12bbbf91f0af1a3a44fa8f8c231beab4edefd776c23650ea139eb674f58c17b254eb
-
SSDEEP
768:Z9QcoE2OMOPIKCb8boucH8ChKd5gEKq1O56BiSA8I1Dg9s92A27Odf3/0o2Zt0JQ:ZNofOhPIKCRL10HIlus127ORP06SV
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 560 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1576 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exepid process 1768 2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.execmd.exedescription pid process target process PID 1768 wrote to memory of 560 1768 2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe cmd.exe PID 1768 wrote to memory of 560 1768 2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe cmd.exe PID 1768 wrote to memory of 560 1768 2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe cmd.exe PID 1768 wrote to memory of 560 1768 2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe cmd.exe PID 560 wrote to memory of 1576 560 cmd.exe tasklist.exe PID 560 wrote to memory of 1576 560 cmd.exe tasklist.exe PID 560 wrote to memory of 1576 560 cmd.exe tasklist.exe PID 560 wrote to memory of 1576 560 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe"C:\Users\Admin\AppData\Local\Temp\2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 2012c5cebabe7ab6bd4ae774e7fcf926014138f50cf5f30558d96f120d2bbe40.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1576