Analysis
-
max time kernel
174s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 17:12
Static task
static1
Behavioral task
behavioral1
Sample
f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe
Resource
win10v2004-20221111-en
General
-
Target
f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe
-
Size
150KB
-
MD5
54c71c18183ef05b38143473d5fa486c
-
SHA1
8adec4c1367c8f580f68e47b26c2f2ef9d51f494
-
SHA256
f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e
-
SHA512
e8456b6783a98bfda0ee8c45da3b6482a996eebcda7743180e66d875b520d37863a81685754b8733360f4ca7567d3d351f27bcfe316a31a10c3bc420ad91c2d4
-
SSDEEP
3072:MBmpqM2kO7XGVSQPwqCC+SXwHIlike8pDUvYDGOzubx:MCU1WVSyl+SK0ik5hqOzubx
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\syotom = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe" f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exepid process 728 f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe"C:\Users\Admin\AppData\Local\Temp\f35af41109c4192f60a4022b39789e730fdaf67d77b10d7b90304d53519ff74e.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger