Analysis
-
max time kernel
22s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:48
Static task
static1
Behavioral task
behavioral1
Sample
808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe
Resource
win10v2004-20221111-en
General
-
Target
808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe
-
Size
96KB
-
MD5
5e9911014311103626521ef0bdf08660
-
SHA1
6152be96570732c628f95cf1e63e1349ab2ce959
-
SHA256
808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86
-
SHA512
52c83e6118242d001e970d4d50d3f0f46765e45e1fe0b68889802f3b24a50f56c4da037c21764fad41c717b76e51919d65b39276ae96acbedc291d0700752def
-
SSDEEP
1536:tWrCEP0GhCxdWDuQ4XRrzIqOR71GwCe3+m:ApCxK4VIVjC0
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1488 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1076 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exepid process 1352 808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.execmd.exedescription pid process target process PID 1352 wrote to memory of 1488 1352 808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe cmd.exe PID 1352 wrote to memory of 1488 1352 808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe cmd.exe PID 1352 wrote to memory of 1488 1352 808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe cmd.exe PID 1352 wrote to memory of 1488 1352 808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe cmd.exe PID 1488 wrote to memory of 1076 1488 cmd.exe tasklist.exe PID 1488 wrote to memory of 1076 1488 cmd.exe tasklist.exe PID 1488 wrote to memory of 1076 1488 cmd.exe tasklist.exe PID 1488 wrote to memory of 1076 1488 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe"C:\Users\Admin\AppData\Local\Temp\808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 808b5a05795fa7c4fb2dec6807c1ee5bc388ad7b7caae7568c4a1ba2020e5e86.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1076