Analysis
-
max time kernel
40s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:54
Static task
static1
Behavioral task
behavioral1
Sample
b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe
Resource
win10v2004-20221111-en
General
-
Target
b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe
-
Size
113KB
-
MD5
363e08bd54a707cb6d3376efd0a9372d
-
SHA1
ca4a2d3e6b7447c5570f37fe6b48ace68c87c4ee
-
SHA256
b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc
-
SHA512
af949c47cd3faafc797a0afc2fe1e79f8bc96f63a3dfcda9ebea835438aa32c5c997757eaaa6e0ded6f93e5294b9c4d917696e743569756f903e5116b6de9024
-
SSDEEP
3072:3uiBG6IggKenHasq9y25XquxAzflFEHURitEHyp+xAFSdsmFIb:QggKen6sQy+quegw1AF/1
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1644 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exedescription pid process target process PID 1880 wrote to memory of 1644 1880 b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe cmd.exe PID 1880 wrote to memory of 1644 1880 b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe cmd.exe PID 1880 wrote to memory of 1644 1880 b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe cmd.exe PID 1880 wrote to memory of 1644 1880 b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe"C:\Users\Admin\AppData\Local\Temp\b6770b203665b5a95cd0dfb02fc4c70a39c38731b9cfba858cff24c5b39138cc.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Evp..bat" > nul 2> nul2⤵
- Deletes itself
PID:1644
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5a061ac0fb5f10eef67c14af6fceb2194
SHA17ddfdbfa5b4688dbc67ccd43c35c739c1d51cb54
SHA2565ed09ef7bd677f60cbba13ee00b458705736047ec9c94d52404709d8cb3470e5
SHA5127812494151cef56767779a1f5c475f1b2a1d848cec2e197b78848a17c4d9dc504f7d878d75fcf257a545afd2cdecaf1c09f79f1aad86a50504b80e1bb7416752