Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:13
Static task
static1
Behavioral task
behavioral1
Sample
09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe
Resource
win10v2004-20221111-en
General
-
Target
09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe
-
Size
72KB
-
MD5
448289886c764a5304ba63a223ff9990
-
SHA1
4c49c1d02df1cdd28c710821b2603edfb1faae32
-
SHA256
09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc
-
SHA512
bffee2e11f68aec78deb889ef388e328b72e7ccb8a52f9b081ae372ae345d62a519ae3a529a66a0baef54c91ad951aba1659708d9742e21ca91bb103be43a591
-
SSDEEP
768:xlraDgTbOwfIwrrBIg2Yd2SgoTV6oIWOs9c28moshfNH:3ra0TRgSBIgYSggOsamj9
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 788 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 1496 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exepid process 1192 09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.execmd.exedescription pid process target process PID 1192 wrote to memory of 788 1192 09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe cmd.exe PID 1192 wrote to memory of 788 1192 09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe cmd.exe PID 1192 wrote to memory of 788 1192 09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe cmd.exe PID 1192 wrote to memory of 788 1192 09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe cmd.exe PID 788 wrote to memory of 1496 788 cmd.exe tasklist.exe PID 788 wrote to memory of 1496 788 cmd.exe tasklist.exe PID 788 wrote to memory of 1496 788 cmd.exe tasklist.exe PID 788 wrote to memory of 1496 788 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe"C:\Users\Admin\AppData\Local\Temp\09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 09d66797619de5fb68afef4d285ba89900ff04eea3e89389498fedff25b4f1cc.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1496