Analysis
-
max time kernel
20s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 10:09
Static task
static1
Behavioral task
behavioral1
Sample
2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe
Resource
win10v2004-20220812-en
General
-
Target
2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe
-
Size
127KB
-
MD5
12ae9854902cdae36a089d831462f410
-
SHA1
2a60c6ddf60d5bb2e41cd7eb42c3ccbed5892fad
-
SHA256
2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8
-
SHA512
08760071161a390b18781ec5da3805ced18e5cc7358b230d99c044999769d40a4ab8f5f4226e2d50485a919298a11ba3b5cfd8b2d47f1c1ed42d32bda1b0f91e
-
SSDEEP
3072:peBW+vBDUfBa6GehbUrg4Rq1k6DpjzVnT2QD7sSfL/U:gBbvBKs/rgRk6DplnB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 772 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 772 2028 2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe 28 PID 2028 wrote to memory of 772 2028 2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe 28 PID 2028 wrote to memory of 772 2028 2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe 28 PID 2028 wrote to memory of 772 2028 2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe"C:\Users\Admin\AppData\Local\Temp\2b2df2a42d0ff510589bd8b65e846da7adc826abe1cf695453782e0bfe5835b8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Rdf..bat" > nul 2> nul2⤵
- Deletes itself
PID:772
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5abb0e0b4bb46c8529e000d6c5fcb1de4
SHA15b9eac8942c22195d085732a269b89476652e1e7
SHA2566334335aafe1fe12b7acb98ea5c7a501a4b24fc3df71d3d8c5c84dd2409d2bc6
SHA51240c946ecc36a0a4f408cc490c0b62f859d3df9caaab47c18a251d11a3c1bce47136eafa7b7bbe7dc95b25c1c3e61418d0222e5477bb40a6b1f82bb5effb74adc