Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 06:56
Static task
static1
Behavioral task
behavioral1
Sample
1fe8e5f03a721f0a37fbbf0ea5779d6d.exe
Resource
win7-20220901-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1fe8e5f03a721f0a37fbbf0ea5779d6d.exe
-
Size
275KB
-
MD5
1fe8e5f03a721f0a37fbbf0ea5779d6d
-
SHA1
ef876bed0fa429ee30b5395b69a89ad4d74a3fcc
-
SHA256
5eb0b4b21107152dfbfaed3a9c61233233d3cab8a650cbb88dcfc34cff1f99ec
-
SHA512
35331dc01b743553abc6e17c9aced57fa28d5bca9a0292b6ec5fc6f60574b8710605d7a4fa34a7331847dd4c9349ae1017d44aba975358612988a8a2c49cadac
-
SSDEEP
6144:+FU/LHPiDaqkg7kKCfVWkF6N+k17tzTpq:+FYjiDaTgvsu7hT
Malware Config
Extracted
Family
nymaim
C2
45.139.105.171
85.31.46.167
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1776 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 296 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskkill.exedescription pid process Token: SeDebugPrivilege 296 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1fe8e5f03a721f0a37fbbf0ea5779d6d.execmd.exedescription pid process target process PID 1484 wrote to memory of 1776 1484 1fe8e5f03a721f0a37fbbf0ea5779d6d.exe cmd.exe PID 1484 wrote to memory of 1776 1484 1fe8e5f03a721f0a37fbbf0ea5779d6d.exe cmd.exe PID 1484 wrote to memory of 1776 1484 1fe8e5f03a721f0a37fbbf0ea5779d6d.exe cmd.exe PID 1484 wrote to memory of 1776 1484 1fe8e5f03a721f0a37fbbf0ea5779d6d.exe cmd.exe PID 1776 wrote to memory of 296 1776 cmd.exe taskkill.exe PID 1776 wrote to memory of 296 1776 cmd.exe taskkill.exe PID 1776 wrote to memory of 296 1776 cmd.exe taskkill.exe PID 1776 wrote to memory of 296 1776 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fe8e5f03a721f0a37fbbf0ea5779d6d.exe"C:\Users\Admin\AppData\Local\Temp\1fe8e5f03a721f0a37fbbf0ea5779d6d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1fe8e5f03a721f0a37fbbf0ea5779d6d.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1fe8e5f03a721f0a37fbbf0ea5779d6d.exe" & exit2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1fe8e5f03a721f0a37fbbf0ea5779d6d.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:296