Analysis
-
max time kernel
181s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 08:16
Static task
static1
Behavioral task
behavioral1
Sample
edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe
Resource
win10v2004-20220812-en
General
-
Target
edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe
-
Size
3.6MB
-
MD5
b62359aa73db3d44630c3892ee7a29a0
-
SHA1
adca0885b09627dfb4674236ac8a69cd7411b38a
-
SHA256
edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16
-
SHA512
17be02d8f6b06d2ab78522663a596cd9b1e491c242b7d7b596df0d1a06a5a9b2709a22f7c81778343fab1742ff9fad9dd2000c71f5fe883532616d9ea6c90f91
-
SSDEEP
98304:46z/x0E2drcIEzKjN2CC+A0ZUSDI2sR6z/x0E2drcIEzKjN2CC+A0ZUSDI2sR6zN:46zqpEOjNDC+dUSo6zqpEOjNDC+dUSow
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1940 set thread context of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4564 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 4564 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 4564 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80 PID 1940 wrote to memory of 4564 1940 edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe"C:\Users\Admin\AppData\Local\Temp\edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe"C:\Users\Admin\AppData\Local\Temp\edda95c6aa20ecc8dd7ee86fcf32ce7b80f92507f69651f493cc61e69538cb16.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:4564
-