Analysis
-
max time kernel
166s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:12
Static task
static1
Behavioral task
behavioral1
Sample
3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe
Resource
win10v2004-20221111-en
General
-
Target
3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe
-
Size
88KB
-
MD5
1c8028b9c97d56ddb6e4a5756746fe49
-
SHA1
2fd50f09bce4e8cd9ae15ff764c87c0ccc4ab1ce
-
SHA256
3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35
-
SHA512
81a6350d275d036230257570ed7096d4c5793ea5503380c8e6247186306c0cd9de1216560a6bf3b77e34ee6daaa21c4c890dabfedbe5f6e561aac75fde8c55b5
-
SSDEEP
768:TLtnCSqm7EGD03vPSDjmPCjX7oPYpKib4FkTuCD8vlZ1Ub5M+QsiB9MaY2Ii2I4H:TZNqOEGDYwmsX9dTunZRhIF1rx2VKF
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Software\Microsoft\Windows\CurrentVersion\Run 3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35 = "c:\\windows\\3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe -m" 3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
Processes:
3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exedescription ioc process File opened for modification \??\c:\windows\3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe 3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe File created \??\c:\windows\3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe 3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: LoadsDriver 6 IoCs
Processes:
pid 4 4 4 4 4 644 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exepid process 2388 3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exepid process 2388 3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe"C:\Users\Admin\AppData\Local\Temp\3cfc7d79ae39ae9bb4b8f3bc8fd6301611b9404f55b4242ea61128e6150e1c35.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2388