Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:46
Static task
static1
Behavioral task
behavioral1
Sample
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe
Resource
win10v2004-20221111-en
General
-
Target
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe
-
Size
92KB
-
MD5
4736f438969d72afce6a77e9da63f9a0
-
SHA1
6aceb006cf483cd9669924eff2affd520475b0a0
-
SHA256
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b
-
SHA512
1a33e9a139adf821fe1399decac0d76188ee316c89520f624759c9f6c9919e17001beaa77457dd5afdab31ea6bc7ad9d7aa18c3550bd80b3d1ee5246a98fc2f1
-
SSDEEP
1536:BawyQ/W+REElorg8/iwHdk6SzuAatLfts4V0dVnjy+Wm0eBecl1j:7Rborg8/bHdk6SzuAatLfts4KVnjy+Wg
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 680 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exepid process 2020 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.execmd.exedescription pid process target process PID 2020 wrote to memory of 268 2020 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe cmd.exe PID 2020 wrote to memory of 268 2020 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe cmd.exe PID 2020 wrote to memory of 268 2020 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe cmd.exe PID 2020 wrote to memory of 268 2020 eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe cmd.exe PID 268 wrote to memory of 680 268 cmd.exe tasklist.exe PID 268 wrote to memory of 680 268 cmd.exe tasklist.exe PID 268 wrote to memory of 680 268 cmd.exe tasklist.exe PID 268 wrote to memory of 680 268 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe"C:\Users\Admin\AppData\Local\Temp\eb00eb301cd92f639ed0eca4d7915beab5be0d45f41f050dc68858c3b2e5999b.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del eb00eb301cd92f639ed0eca4d7915beab52⤵
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:680