Analysis
-
max time kernel
36s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe
Resource
win10v2004-20220901-en
General
-
Target
79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe
-
Size
64KB
-
MD5
e1725f325d0e8e77e2dea849e7268027
-
SHA1
9061d127e23ba903f0654ace69730d46d212ac84
-
SHA256
79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba
-
SHA512
1b2dbec671437a56d3d320a886b056355243fa2117c05e7e869132e06b3e676175e6983800a5ad1452c49b221ecf2da8dcfbeb97ddbbf3311c9e0b89be0c6d7c
-
SSDEEP
768:hUEoG9h55Ufo0bIGfitZ0DGsmTIhbez5zeNSWN112wzUXiylDpPO:hhhIvy/efzUXbVW
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1096 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1096 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1992 79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1340 1992 79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe 27 PID 1992 wrote to memory of 1340 1992 79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe 27 PID 1992 wrote to memory of 1340 1992 79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe 27 PID 1992 wrote to memory of 1340 1992 79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe 27 PID 1340 wrote to memory of 1096 1340 cmd.exe 29 PID 1340 wrote to memory of 1096 1340 cmd.exe 29 PID 1340 wrote to memory of 1096 1340 cmd.exe 29 PID 1340 wrote to memory of 1096 1340 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe"C:\Users\Admin\AppData\Local\Temp\79b905b4ce369dabf51dc46e2ae2ae26e109a7284695e8e419f7943d0a5865ba.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 79b905b4ce369dabf51dc46e2ae2ae26e12⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1096
-
-