Analysis
-
max time kernel
13s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe
Resource
win10v2004-20220812-en
General
-
Target
f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe
-
Size
68KB
-
MD5
935a6485ac6fb4aa1f1dc5a880a47cbf
-
SHA1
a304447580c987d6375ae584aeb4c598a0666399
-
SHA256
f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335
-
SHA512
f65987f781be4bd3bc0737116c7dcebd5888aa48c7f49416486cc633e6181dec3e577f8c72cf965495ca3b260fbb792da767ce1d85edc6745a82a690a47dd144
-
SSDEEP
1536:eO0nL0QOnuFDmLpnMT2CBrnTndnXnxC1XWXBXAXRM:ILQu9apMBB2
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1444 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeSecurityPrivilege 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe Token: SeDebugPrivilege 1444 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2004 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe 29 PID 1188 wrote to memory of 2004 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe 29 PID 1188 wrote to memory of 2004 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe 29 PID 1188 wrote to memory of 2004 1188 f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe 29 PID 2004 wrote to memory of 1444 2004 cmd.exe 31 PID 2004 wrote to memory of 1444 2004 cmd.exe 31 PID 2004 wrote to memory of 1444 2004 cmd.exe 31 PID 2004 wrote to memory of 1444 2004 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe"C:\Users\Admin\AppData\Local\Temp\f2c171850d9ca11f1b079594f2a058269e223f00ce2526137ee2cb2695cba335.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del f2c171850d9ca11f1b079594f2a058269e2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-