Analysis
-
max time kernel
42s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
375dd75518cff9dc7100c611a274da62b05a3ad70a1a82ee3491c1b091c179ce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
375dd75518cff9dc7100c611a274da62b05a3ad70a1a82ee3491c1b091c179ce.exe
Resource
win10v2004-20220812-en
General
-
Target
375dd75518cff9dc7100c611a274da62b05a3ad70a1a82ee3491c1b091c179ce.exe
-
Size
4.3MB
-
MD5
fb7650b651dc5102a9f03b619024b9c2
-
SHA1
e3958614ccb079c5f1cae940e23ed160620b74c2
-
SHA256
375dd75518cff9dc7100c611a274da62b05a3ad70a1a82ee3491c1b091c179ce
-
SHA512
73bdaf692fe58aa117013876daa67feaba788ecb3104a258cab77239212cfeff133358448cfc07b337c1cacab5b8dfa7ddf9da9ac50a2809bd945160e1926eb2
-
SSDEEP
98304:o9MpHhvYzprr/vBHijXUMgBZwcU9hbkBjL2mGTO2+72AeqL//H3:9pHh2nnQpgBZwv9xSky2+77/H3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1076 375dd75518cff9dc7100c611a274da62b05a3ad70a1a82ee3491c1b091c179ce.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1076 375dd75518cff9dc7100c611a274da62b05a3ad70a1a82ee3491c1b091c179ce.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\375dd75518cff9dc7100c611a274da62b05a3ad70a1a82ee3491c1b091c179ce.exe"C:\Users\Admin\AppData\Local\Temp\375dd75518cff9dc7100c611a274da62b05a3ad70a1a82ee3491c1b091c179ce.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1076