Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe
Resource
win10v2004-20220812-en
General
-
Target
b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe
-
Size
2.7MB
-
MD5
cc659c5862e7d1930dcb47dd11a7e178
-
SHA1
6a9971919d7da42673876007be393fa18155a30f
-
SHA256
b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7
-
SHA512
46fd2ac20c7009f1b43a56ffc4ff16587fa3099b7e13eb1e68f1e8bc8622520b58b46e8b70461f6234880526333ee40584b696a117402a724db0b83e7eb15e0e
-
SSDEEP
49152:kGU6QNADYFM9klsMwZfoikxZNS0Cu1EAP0Pre2ksomJqMIY0ng91LGSDsEyizNx6:ZU3yYeSsMOkbLCz+2k4AnuLGM1r6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5004 is-7JQBR.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 5004 3144 b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe 80 PID 3144 wrote to memory of 5004 3144 b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe 80 PID 3144 wrote to memory of 5004 3144 b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe"C:\Users\Admin\AppData\Local\Temp\b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\is-H609V.tmp\is-7JQBR.tmp"C:\Users\Admin\AppData\Local\Temp\is-H609V.tmp\is-7JQBR.tmp" /SL4 $A0048 "C:\Users\Admin\AppData\Local\Temp\b665e81d66ce83bc7d0504d7f052b302d91db742fb2266d0b4bd80735074a2d7.exe" 2610169 512002⤵
- Executes dropped EXE
PID:5004
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649KB
MD5897787d6abd66a5f10927d8fb6645f55
SHA1f6106753adb23afd105e3b677f8b6c005812e850
SHA256a68a96927d72c5a0be27b3a9c6a70f35c4c495167e76813a81febe586d547c1f
SHA5127488348ddf93c3251321db47bda22be0df18aeff0d407c1cfb483855be724cc333b212810c4123a672bd2e70cc2734a83f952c24f553dbfeacd14d48f922262c
-
Filesize
649KB
MD5897787d6abd66a5f10927d8fb6645f55
SHA1f6106753adb23afd105e3b677f8b6c005812e850
SHA256a68a96927d72c5a0be27b3a9c6a70f35c4c495167e76813a81febe586d547c1f
SHA5127488348ddf93c3251321db47bda22be0df18aeff0d407c1cfb483855be724cc333b212810c4123a672bd2e70cc2734a83f952c24f553dbfeacd14d48f922262c