Analysis
-
max time kernel
150s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 07:46
Static task
static1
Behavioral task
behavioral1
Sample
93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe
Resource
win10v2004-20221111-en
General
-
Target
93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe
-
Size
659KB
-
MD5
d4c85a78d9ba5cd4c0d06194ad804abf
-
SHA1
279a2da370dbe15b20ba1f93b8084fdfc18fa5ec
-
SHA256
93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd
-
SHA512
52a011edd1dfad910915fc24b64f55f8e454613f3c3abde689d45d8673f84bfa12baacfd595b52c53965f9b350e607b9736f1cad322df01f32099d9d51d0dca7
-
SSDEEP
12288:6AyvpfnHq+NRkqR+RqgHvpRdEzWmLLuLAkyUyaAGY5OKCy5Z5DePzqh545+aXh5d:zyv5KAeqR+RqSHdEzJmfJixOKCy5Z5DI
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2472-134-0x00000000022A0000-0x00000000023E6000-memory.dmp upx behavioral2/memory/2472-137-0x00000000022A0000-0x00000000023E6000-memory.dmp upx behavioral2/memory/2472-138-0x00000000022A0000-0x00000000023E6000-memory.dmp upx behavioral2/memory/2472-139-0x00000000022A0000-0x00000000023E6000-memory.dmp upx behavioral2/memory/2472-140-0x00000000022A0000-0x00000000023E6000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exepid process 2472 93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe 2472 93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe 2472 93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe 2472 93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exedescription pid process Token: SeShutdownPrivilege 2472 93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe Token: SeCreatePagefilePrivilege 2472 93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exepid process 2472 93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe 2472 93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe"C:\Users\Admin\AppData\Local\Temp\93f60cf23fca149abcb0624b05660cb0ec6b069cd57615253ad43a50101c06bd.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2472