Analysis
-
max time kernel
31s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 21:15
Static task
static1
Behavioral task
behavioral1
Sample
91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe
Resource
win10v2004-20220901-en
General
-
Target
91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe
-
Size
101KB
-
MD5
1725035b197fa46cb9da27fe3d4b87c1
-
SHA1
3f7ddf82ee935780739769308929a0a2bb3b5428
-
SHA256
91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe
-
SHA512
84fe91a3e37576bf2de41aeaed1904f54bba4decd6b1635d384064b99af65f441a253384c154a2fc3662b41e42204c09b3361f0d8651b1310d37162a7f7b28f6
-
SSDEEP
1536:7P4mQ+W4hKwHCtjeWQuhrzb8yUNKAbbzCwHzx5e6ywv77St+iyYzDzRvD3:7Pil4YXBFmxN/fXx5ehwSt+iyYDztD
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1856 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exedescription pid process target process PID 1720 wrote to memory of 1856 1720 91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe cmd.exe PID 1720 wrote to memory of 1856 1720 91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe cmd.exe PID 1720 wrote to memory of 1856 1720 91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe cmd.exe PID 1720 wrote to memory of 1856 1720 91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe"C:\Users\Admin\AppData\Local\Temp\91c47cf21d339ab7ec06da4aad03317d87775382570edc61e5bfe6c12fcd1bbe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Kpj..bat" > nul 2> nul2⤵
- Deletes itself
PID:1856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5504768dcdf41653b9c73bbd240f76c34
SHA14928ca9f8f1d910c0dfd64bf9994322c613daf24
SHA2562568b487e7a84c5f7acaf04d96fbff8958493ff25da5e261a11252707979ff15
SHA51258ad4ed1f05893bcfe5269f6afa2ea1c55321b48d1c9af46de488f600e0ed622043def7878fedc8196b63b3516cede507d7f31b27234de1e384351374d83ca5e