Analysis
-
max time kernel
34s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe
Resource
win10v2004-20221111-en
General
-
Target
3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe
-
Size
431KB
-
MD5
d10206a76f2860c24eb970e9436bf2c2
-
SHA1
513d6b47ceecd8c3919f6a080ffebadeea1a75d0
-
SHA256
3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a
-
SHA512
f55a44d4638e7cdceeeea3866f25d9c30a200a7a68f5b95b2ef561ac394c94ba06c1996c7900788bdb62ecb1811a971ab062df55906210a9a390a4347eebf3a8
-
SSDEEP
6144:wBC2F8NXC796TB9vj48fq6aSWdQksl+R6i8YHccD5kJzMNoV:w7eVQkTrvj4Cu6Ha64HccD5ZaV
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1688 Trojan.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2036 3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1688 2036 3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe 28 PID 2036 wrote to memory of 1688 2036 3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe 28 PID 2036 wrote to memory of 1688 2036 3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe 28 PID 2036 wrote to memory of 1688 2036 3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe"C:\Users\Admin\AppData\Local\Temp\3f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Trojan.exe"C:\Users\Admin\AppData\Local\Temp\Trojan.exe"2⤵
- Executes dropped EXE
PID:1688
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD5d10206a76f2860c24eb970e9436bf2c2
SHA1513d6b47ceecd8c3919f6a080ffebadeea1a75d0
SHA2563f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a
SHA512f55a44d4638e7cdceeeea3866f25d9c30a200a7a68f5b95b2ef561ac394c94ba06c1996c7900788bdb62ecb1811a971ab062df55906210a9a390a4347eebf3a8
-
Filesize
431KB
MD5d10206a76f2860c24eb970e9436bf2c2
SHA1513d6b47ceecd8c3919f6a080ffebadeea1a75d0
SHA2563f897e4604ea52f312218d5a54a68eb7f8e754a57c3fd8474d457fa8d618e43a
SHA512f55a44d4638e7cdceeeea3866f25d9c30a200a7a68f5b95b2ef561ac394c94ba06c1996c7900788bdb62ecb1811a971ab062df55906210a9a390a4347eebf3a8