Analysis
-
max time kernel
30s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:04
Static task
static1
Behavioral task
behavioral1
Sample
f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe
Resource
win10v2004-20221111-en
General
-
Target
f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe
-
Size
76KB
-
MD5
56124060f2cb6c0d1c239292c014f970
-
SHA1
548dee845c5c2691278083a357efa313b8fb1702
-
SHA256
f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f
-
SHA512
fe6b5075ba491dcc46f4fd6dc9f95712b1096c2fa864f985b8c92c0321d6dff08a0beb9d3b4759c263a27952fde03718c4f3165acbcc4d0ba9844fd1d763ca41
-
SSDEEP
768:X/NRiONZlx1g8ESoYBB4g5ANEKVKg3BzJvzl/4EvKXy8BOjHw:X/NRiOhJrz5ANESKgx9rZSBOjQ
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1500 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1064 tasklist.exe -
Suspicious use of SetWindowsHookAW 64 IoCs
Processes:
f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exepid process 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exepid process 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.execmd.exedescription pid process target process PID 1368 wrote to memory of 1500 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe cmd.exe PID 1368 wrote to memory of 1500 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe cmd.exe PID 1368 wrote to memory of 1500 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe cmd.exe PID 1368 wrote to memory of 1500 1368 f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe cmd.exe PID 1500 wrote to memory of 1064 1500 cmd.exe tasklist.exe PID 1500 wrote to memory of 1064 1500 cmd.exe tasklist.exe PID 1500 wrote to memory of 1064 1500 cmd.exe tasklist.exe PID 1500 wrote to memory of 1064 1500 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe"C:\Users\Admin\AppData\Local\Temp\f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookAW
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del f83d9c664aad2650f14021fb4624a1e213bfc52901c7dd5e0797bfd6358fac5f.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1064