Analysis
-
max time kernel
71s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:01
Static task
static1
Behavioral task
behavioral1
Sample
737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe
Resource
win10v2004-20221111-en
General
-
Target
737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe
-
Size
24KB
-
MD5
50a5d4c0cc7acf35a03813d379811198
-
SHA1
2dd2b9f047ebc2c439da3582b8494551c2380b15
-
SHA256
737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f
-
SHA512
b4ab7822e148a3fbc4f1881548ae3171d2722fe791e427e7ddff1df3f226908bc6e212fc764c3eaddaf6585fc27304476a130472b143372309eab563918dd668
-
SSDEEP
384:eNu10YN7b46+zU43BtgiiHEMBtuTn7O4hZEbxw:KuGp6SNiJmBzEm
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 544 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 988 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exepid process 1600 737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe 1600 737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.execmd.exedescription pid process target process PID 1600 wrote to memory of 544 1600 737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe cmd.exe PID 1600 wrote to memory of 544 1600 737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe cmd.exe PID 1600 wrote to memory of 544 1600 737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe cmd.exe PID 1600 wrote to memory of 544 1600 737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe cmd.exe PID 544 wrote to memory of 988 544 cmd.exe tasklist.exe PID 544 wrote to memory of 988 544 cmd.exe tasklist.exe PID 544 wrote to memory of 988 544 cmd.exe tasklist.exe PID 544 wrote to memory of 988 544 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe"C:\Users\Admin\AppData\Local\Temp\737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 737eabffd71f5dc1e58ad42f33fafb863190827de054a135d267507c7501255f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-