Analysis
-
max time kernel
42s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:54
Static task
static1
Behavioral task
behavioral1
Sample
baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe
Resource
win10v2004-20221111-en
General
-
Target
baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe
-
Size
113KB
-
MD5
1b6e444ba7241ccaed3fb67e191cf605
-
SHA1
885b749ced5993737081b47dcb490cce18498af9
-
SHA256
baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3
-
SHA512
eb4c6a3d5f91b5851808124b6f4d5437988c26136c78ea1b7e9d64e107e6a2d04a442955dfae57be18cebbfabbdee3e7bdcd6116bd32c1538c2b1070ee694f67
-
SSDEEP
3072:QuiBG6IggKenHasq9y25XquxAzflFEHURitEHyp+xAFSdsmFIb:hggKen6sQy+quegw1AF/1
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 844 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exedescription pid process target process PID 1496 wrote to memory of 844 1496 baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe cmd.exe PID 1496 wrote to memory of 844 1496 baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe cmd.exe PID 1496 wrote to memory of 844 1496 baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe cmd.exe PID 1496 wrote to memory of 844 1496 baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe"C:\Users\Admin\AppData\Local\Temp\baf99e7e22e7a8e5419b9f5fe971376f7f335489b7dfc8ce0476561d70f8b7d3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Vcz..bat" > nul 2> nul2⤵
- Deletes itself
PID:844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD56c4ed9ea110c21ddb5be5ce3de3d486f
SHA157b12daf9794f7c2c0beda37c730e5a218ce746d
SHA256ea2f43a7c94c8659e961207bf79c082b575f3c3916d475128557568cc5600a57
SHA5121382c265baadba4170e98d59f479e6e98d08e01e4d8818dad655ffe29337e345dfcb84553869b00e41ea65c95bec3e56cac29f0a9fee7fa060830eb7c2a7894c