Analysis

  • max time kernel
    356s
  • max time network
    478s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 16:35

General

  • Target

    8ed5c973962b8368601758e2c18c50851aa233af622dfbf93db4a4729d0ff93f.exe

  • Size

    190KB

  • MD5

    9c23dc30473e7be133d20b8e65985296

  • SHA1

    dc66a39d816eb92942a93dc47fbcc503e9672a9d

  • SHA256

    8ed5c973962b8368601758e2c18c50851aa233af622dfbf93db4a4729d0ff93f

  • SHA512

    58cf47e399c3e1a7d0c6c983da817799e338175172d4c5db4c103dbd00d6881708a2437d00cd2e33cde50b50c6d09b0df6fdf5b3efbd3db3d07224f14a4e9bf2

  • SSDEEP

    3072:2kBGWOsTIJgIDU5A/cpubouDfEsUsT0hH00bxUW/kE/361EQl76eNQyVv7R2KBgd:21ssjTouDEsUs4500xsW61EsnBQKBgD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ed5c973962b8368601758e2c18c50851aa233af622dfbf93db4a4729d0ff93f.exe
    "C:\Users\Admin\AppData\Local\Temp\8ed5c973962b8368601758e2c18c50851aa233af622dfbf93db4a4729d0ff93f.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe -windowstyle hidden $a = Get-Content 'C:\Users\Admin\AppData\Local\Temp\vatnisser\Vrdighedskravene\Spdbrnspleje\Tapetseringens\bukoliskes.Amm3' ; C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "$a"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:824

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/824-133-0x0000000002B60000-0x0000000002B96000-memory.dmp

          Filesize

          216KB

        • memory/824-134-0x0000000005360000-0x0000000005988000-memory.dmp

          Filesize

          6.2MB

        • memory/824-135-0x0000000005090000-0x00000000050B2000-memory.dmp

          Filesize

          136KB

        • memory/824-136-0x0000000005990000-0x00000000059F6000-memory.dmp

          Filesize

          408KB

        • memory/824-137-0x0000000005A00000-0x0000000005A66000-memory.dmp

          Filesize

          408KB

        • memory/824-138-0x0000000006060000-0x000000000607E000-memory.dmp

          Filesize

          120KB