Analysis
-
max time kernel
79s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe
Resource
win10v2004-20221111-en
General
-
Target
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe
-
Size
64KB
-
MD5
58b3841e1328852d18057a104a509a60
-
SHA1
28b38e7e5b51ca5a0a322fe0aa254c4f1fbf0dfb
-
SHA256
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24
-
SHA512
ef5e2ca99a5d3ee7d88472387bced54186078fd85026c04a07bb2f7be1395121882b00fc2c0df5c7b02d8e7f35c0da438552b9d3f10e741f381dbb00eec0069a
-
SSDEEP
1536:khVdbbu4f2k0iM8RiQOcDh7Rg1otiV0BPUfeMebZJ:CG4+NWOcFO0qfeTJ
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1752 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exepid process 1776 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.execmd.exedescription pid process target process PID 1776 wrote to memory of 1856 1776 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe cmd.exe PID 1776 wrote to memory of 1856 1776 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe cmd.exe PID 1776 wrote to memory of 1856 1776 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe cmd.exe PID 1776 wrote to memory of 1856 1776 6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe cmd.exe PID 1856 wrote to memory of 1752 1856 cmd.exe tasklist.exe PID 1856 wrote to memory of 1752 1856 cmd.exe tasklist.exe PID 1856 wrote to memory of 1752 1856 cmd.exe tasklist.exe PID 1856 wrote to memory of 1752 1856 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe"C:\Users\Admin\AppData\Local\Temp\6727f65c17cb0f91d4bd52ba1174df3c16c4dc04fc04ddc420bb1bd8263e9e24.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 6727f65c17cb0f91d4bd52ba1174df3c162⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1752