Analysis
-
max time kernel
62s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:37
Static task
static1
Behavioral task
behavioral1
Sample
66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe
Resource
win10v2004-20221111-en
General
-
Target
66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe
-
Size
73KB
-
MD5
44c1c5ddff0398554bbc20d66c2f9ea0
-
SHA1
f8a897c7f01dc5724b31bcace28d0a8c81fc8cb2
-
SHA256
66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e
-
SHA512
19d4508a4103a9e626f63991e12152f9ff1550a4c0576f7a48664a22c6a03521def6d3e6bb6f6c69744b8dfebefa49ead0e88b64d4bfb6992ce121e102825e01
-
SSDEEP
768:+OEXA94anygNshmqluQ4UXUEPLsbaxlWuzG3k4TajMMEU5yeT7D7dmxmf:+Op4uyblkeLg40xhmrT7D7dQm
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 956 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1656 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exepid process 1704 66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.execmd.exedescription pid process target process PID 1704 wrote to memory of 956 1704 66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe cmd.exe PID 1704 wrote to memory of 956 1704 66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe cmd.exe PID 1704 wrote to memory of 956 1704 66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe cmd.exe PID 1704 wrote to memory of 956 1704 66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe cmd.exe PID 956 wrote to memory of 1656 956 cmd.exe tasklist.exe PID 956 wrote to memory of 1656 956 cmd.exe tasklist.exe PID 956 wrote to memory of 1656 956 cmd.exe tasklist.exe PID 956 wrote to memory of 1656 956 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe"C:\Users\Admin\AppData\Local\Temp\66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 66a1b0febca26b59ac499f432f7a7be17348a3bfdab12f05859a0fa6b69a5f7e.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1656