Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe
Resource
win10v2004-20220901-en
General
-
Target
8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe
-
Size
1.1MB
-
MD5
91b1db7e3292f487f66f3d9c170d6e5e
-
SHA1
6420eef5b702cb6010c29716fb1c73d83de571c0
-
SHA256
8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6
-
SHA512
a335b449aa9160a371a1e0c03c86e13292460455dc72f057613b3ae2491cccf537473006997427129d3efaf00ad944fdd26e9e9f68537bea3d3b60d4e2199bf3
-
SSDEEP
24576:Ro22Jna7K7GlxW9CGlLxSAty9dvhKR6rVL0vZsHCVcHiEddMJL0:jgaG7QxWAML0AA9JU8rVYhV6SF0
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 6 IoCs
pid Process 1704 netsh.exe 1528 netsh.exe 1416 netsh.exe 2004 netsh.exe 904 netsh.exe 316 netsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 364 wrote to memory of 1704 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 26 PID 364 wrote to memory of 1704 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 26 PID 364 wrote to memory of 1704 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 26 PID 364 wrote to memory of 1704 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 26 PID 364 wrote to memory of 1528 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 28 PID 364 wrote to memory of 1528 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 28 PID 364 wrote to memory of 1528 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 28 PID 364 wrote to memory of 1528 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 28 PID 364 wrote to memory of 1416 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 30 PID 364 wrote to memory of 1416 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 30 PID 364 wrote to memory of 1416 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 30 PID 364 wrote to memory of 1416 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 30 PID 364 wrote to memory of 1132 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 32 PID 364 wrote to memory of 1132 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 32 PID 364 wrote to memory of 1132 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 32 PID 364 wrote to memory of 1132 364 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 32 PID 1132 wrote to memory of 2004 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 33 PID 1132 wrote to memory of 2004 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 33 PID 1132 wrote to memory of 2004 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 33 PID 1132 wrote to memory of 2004 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 33 PID 1132 wrote to memory of 904 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 34 PID 1132 wrote to memory of 904 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 34 PID 1132 wrote to memory of 904 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 34 PID 1132 wrote to memory of 904 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 34 PID 1132 wrote to memory of 316 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 37 PID 1132 wrote to memory of 316 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 37 PID 1132 wrote to memory of 316 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 37 PID 1132 wrote to memory of 316 1132 8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe"C:\Users\Admin\AppData\Local\Temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\users\admin\appdata\local\temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe" enable=yes profile=domain2⤵
- Modifies Windows Firewall
PID:1704
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\users\admin\appdata\local\temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe" enable=yes profile=private2⤵
- Modifies Windows Firewall
PID:1528
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\users\admin\appdata\local\temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe" enable=yes profile=public2⤵
- Modifies Windows Firewall
PID:1416
-
-
C:\Users\Admin\AppData\Local\Temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe"C:\Users\Admin\AppData\Local\Temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\users\admin\appdata\local\temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe" enable=yes profile=domain3⤵
- Modifies Windows Firewall
PID:2004
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\users\admin\appdata\local\temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe" enable=yes profile=private3⤵
- Modifies Windows Firewall
PID:904
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Windows Update Service" dir=in action=allow program="c:\users\admin\appdata\local\temp\8a299d52e6c5c9190ad19c623539bcb07403f2c1bc92c1f572b330aa9b0cfbb6.exe" enable=yes profile=public3⤵
- Modifies Windows Firewall
PID:316
-
-