Analysis
-
max time kernel
139s -
max time network
83s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 20:55
Static task
static1
Behavioral task
behavioral1
Sample
e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe
Resource
win10v2004-20220812-en
General
-
Target
e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe
-
Size
104KB
-
MD5
06ecd5af41bb6cd914272ca2184e19ba
-
SHA1
faa9b72655c7521f512ce699ba046fc54ebc34b1
-
SHA256
e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3
-
SHA512
6f59d94d3bf491eb32c3c3ed529003d2849fadd55e464b18a45ab33d82c6b4c8886a87e9b6704215cd25e2de06a993084d6060c8594e683afd765c0badbfbda1
-
SSDEEP
1536:vQkFHw0C3MKxgtpRiRI20SjH8zHBgm9h7BkIzb9ur8jiJTtU:3Q0GspRip/jH8zHBgmXgr8mU
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1064 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tasklist.exedescription pid process Token: SeDebugPrivilege 992 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exepid process 1676 e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe 1676 e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.execmd.exedescription pid process target process PID 1676 wrote to memory of 1064 1676 e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe cmd.exe PID 1676 wrote to memory of 1064 1676 e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe cmd.exe PID 1676 wrote to memory of 1064 1676 e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe cmd.exe PID 1676 wrote to memory of 1064 1676 e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe cmd.exe PID 1064 wrote to memory of 992 1064 cmd.exe tasklist.exe PID 1064 wrote to memory of 992 1064 cmd.exe tasklist.exe PID 1064 wrote to memory of 992 1064 cmd.exe tasklist.exe PID 1064 wrote to memory of 992 1064 cmd.exe tasklist.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe"C:\Users\Admin\AppData\Local\Temp\e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del e5922a2aaca379692fcd059e9b130a9308eba732eb49d739e68e8117c4f28bd3.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:992