Analysis
-
max time kernel
129s -
max time network
220s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe
Resource
win10v2004-20220812-en
General
-
Target
06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe
-
Size
1.5MB
-
MD5
3e79a0974450db19c5aaedb6417abbce
-
SHA1
cc500a243549e723f37872df412684575b3fa370
-
SHA256
06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9
-
SHA512
1f9d6378737fb0430ddc586c6cd4aae12dca11d3ff6cfb826609ab236b2076a3698b4a151ffab6bd6d6f8453bf0bee09b993df1041a4a0dcb47bfbee6069a14e
-
SSDEEP
24576:Hpa/O74CNt3r2J2FC3eUldZUJ3OlKU4UDcc6Cy+9eG7:wcZC35VcOcmDcc6Cdl
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 900 set thread context of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 704 PING.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 588 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 588 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 588 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 588 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 588 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 900 wrote to memory of 1368 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 28 PID 900 wrote to memory of 1368 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 28 PID 900 wrote to memory of 1368 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 28 PID 900 wrote to memory of 1368 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 28 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 1368 wrote to memory of 704 1368 cmd.exe 31 PID 1368 wrote to memory of 704 1368 cmd.exe 31 PID 1368 wrote to memory of 704 1368 cmd.exe 31 PID 1368 wrote to memory of 704 1368 cmd.exe 31 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30 PID 900 wrote to memory of 588 900 06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe"C:\Users\Admin\AppData\Local\Temp\06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping -c 5 8.8.8.82⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\PING.EXEping -c 5 8.8.8.83⤵
- Runs ping.exe
PID:704
-
-
-
C:\Users\Admin\AppData\Local\Temp\06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe"C:\Users\Admin\AppData\Local\Temp\06affa1f97ef2825105ff49043a7c65b09ef154194b51402e5e8072dbadfbfa9.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:588
-