Analysis
-
max time kernel
38s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 00:55
Static task
static1
Behavioral task
behavioral1
Sample
cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe
Resource
win10v2004-20221111-en
General
-
Target
cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe
-
Size
77KB
-
MD5
7c94c7270ca140081e8477a0302840cf
-
SHA1
f9038f0a31aa7acdb6c03ac389e092fe0c28b645
-
SHA256
cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825
-
SHA512
66b1bbb58661ce05cee1b807cfd17cdf5f6b6098ced8ee8c7bce318ceaf4886cfd37f64084e0c847fa35e938722482069708eb22cb399de2c779a980c763be20
-
SSDEEP
1536:AiQgzHtbheQi4C9bnWe7z9EQ3G2e7JqSbk4p:lQgzHnCNhWSGXVqz4p
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 828 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1408 wrote to memory of 828 1408 cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe 26 PID 1408 wrote to memory of 828 1408 cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe 26 PID 1408 wrote to memory of 828 1408 cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe 26 PID 1408 wrote to memory of 828 1408 cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe 26 PID 1408 wrote to memory of 828 1408 cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe 26 PID 1408 wrote to memory of 828 1408 cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe 26 PID 1408 wrote to memory of 828 1408 cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe"C:\Users\Admin\AppData\Local\Temp\cdf5027b1bfe45ae7361fc4ec4e09118d6c8884bbfcb3dcae0e5eec4e4810825.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Jnj..bat" > nul 2> nul2⤵
- Deletes itself
PID:828
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5b63c93f2a575e8ba8ece80afb3fa1d27
SHA14ae53fd900f95cd11f4a2b7c39e53a62b537c986
SHA2561e79a2549a595331c800279f4f8b3fcc8d189b5efbcf5ec68742147bc2b06a33
SHA51206761191bac5fb28238d584fb74b310aa311254f4230c0af86ed1ec47f4b0869e534cb90a4a7b6333422f326ed79cd76bf1dee29c4eb3355a62e32d2d9143dc3