Analysis
-
max time kernel
39s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe
Resource
win10v2004-20220812-en
General
-
Target
a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe
-
Size
92KB
-
MD5
744e56d37738616d7154b92147c693d3
-
SHA1
044209f30308843d7cc198fb678ff544d4b0e9d8
-
SHA256
a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895
-
SHA512
0d698b5cb69113d2a4206c2fd17a3c29dc196df9ca50a3a608915aa6d2758a7412e940db3906422259da8fdffedbe8c92df1bd86763df70a99568c6de5cc518a
-
SSDEEP
768:4mp1D5+8+yyCExggbX4xyhKpDq3y2qimSr4CsDqel30JbP6XTI3WoUUZ+IcnR7S:4CD5ePN4xye0C3tDj8r6XEJTc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1704 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1704 tasklist.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1388 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 1388 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1388 wrote to memory of 980 1388 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 28 PID 1388 wrote to memory of 980 1388 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 28 PID 1388 wrote to memory of 980 1388 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 28 PID 1388 wrote to memory of 980 1388 a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe 28 PID 980 wrote to memory of 1704 980 cmd.exe 30 PID 980 wrote to memory of 1704 980 cmd.exe 30 PID 980 wrote to memory of 1704 980 cmd.exe 30 PID 980 wrote to memory of 1704 980 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe"C:\Users\Admin\AppData\Local\Temp\a90eeb3d8224df965bc40d04773937fed6618c4c6190349be9f220cb0701e895.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del a90eeb3d8224df965bc40d04773937fed62⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-