Analysis
-
max time kernel
151s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 06:58
Behavioral task
behavioral1
Sample
033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe
Resource
win10v2004-20221111-en
General
-
Target
033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe
-
Size
53KB
-
MD5
010aeb7fe6959e92e521be3fdc5dc900
-
SHA1
193840d75599f108de10c5a98a38c7bb4edbf32a
-
SHA256
033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3
-
SHA512
91c8660a46e17e5e98fe053bdce363e347762a07b05e8c39487f361c5e5a6c1461e47902f1f559138e2bcb2a5936a5eb152241b7a225db6efe377e1df4f95ffc
-
SSDEEP
768:4jtCpMIpNTmP0dRHlhD3w42Yb+VdHbaQ/hjGWOMUK+tGDoIwn40znLdUojIV9:4jUB3D3PlOdHbauj24kLdUSIf
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2124-132-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2124-133-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\CurrentVersion\Run 033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3 = "c:\\windows\\033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe -m" 033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe 033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe File opened for modification \??\c:\windows\033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe 033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 648 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2124 033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe 2124 033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2124 033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe 2124 033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe"C:\Users\Admin\AppData\Local\Temp\033608e2edbbc1fe626b5979ebdd72f315d2ab9c84663daf917ae5ca566bebb3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2124