Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:29
Static task
static1
Behavioral task
behavioral1
Sample
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe
Resource
win10v2004-20221111-en
General
-
Target
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe
-
Size
84KB
-
MD5
53777ced2ba1455ea1f9f307997456a0
-
SHA1
ab987edad8b08b0971b3569b9be6ff8d1a22ea22
-
SHA256
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610
-
SHA512
8ae3a4a194bd71a2bf6fa903c6825e22833e518744d46e25bc1b3cbd599b12216a6047820a6eef9eee9de3c92a500f29a3beeca2461d65e913425f1472d5e6ea
-
SSDEEP
1536:mewr+Ucxh6cbsR8ZW8XScmFroZUdjINPQuoL:33xj/lmtdsJfC
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 524 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1924 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exepid process 1492 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.execmd.exedescription pid process target process PID 1492 wrote to memory of 524 1492 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe cmd.exe PID 1492 wrote to memory of 524 1492 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe cmd.exe PID 1492 wrote to memory of 524 1492 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe cmd.exe PID 1492 wrote to memory of 524 1492 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe cmd.exe PID 524 wrote to memory of 1924 524 cmd.exe tasklist.exe PID 524 wrote to memory of 1924 524 cmd.exe tasklist.exe PID 524 wrote to memory of 1924 524 cmd.exe tasklist.exe PID 524 wrote to memory of 1924 524 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe"C:\Users\Admin\AppData\Local\Temp\7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 7fe4759730372677f9e0f1915b8d128412c09c0b819af647ada93e00c4431610.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1924