Analysis
-
max time kernel
269s -
max time network
342s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 21:05
Static task
static1
Behavioral task
behavioral1
Sample
92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85.exe
Resource
win10v2004-20221111-en
General
-
Target
92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85.exe
-
Size
508KB
-
MD5
a8afc13b00c336114156453e11efbad7
-
SHA1
b40287154894e9543e3423faa78f4d324a9ce3bb
-
SHA256
92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85
-
SHA512
84e65574389e33654efae2d77cc98888fe27b1e5586a9fc42afb09098b1b25057081a1054322c028f2bc1731bef6e5fbbeee8f13a86cfb346c08c19cf09527d0
-
SSDEEP
6144:zAffEg+7irp6u7BDMnP5LhhFxZJWnZ8j7wJkcuGzG8:kXR+irMu79ERLhhFVWnS7TcvG8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4244 240763718.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1840 wrote to memory of 4244 1840 92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85.exe 82 PID 1840 wrote to memory of 4244 1840 92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85.exe 82 PID 1840 wrote to memory of 4244 1840 92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85.exe"C:\Users\Admin\AppData\Local\Temp\92c6df609046a60222cf050ad982a778923f809d5016c5f0cd09c565025d7c85.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\240763718.tmpC:\Users\Admin\AppData\Local\Temp\240763718.tmp2⤵
- Executes dropped EXE
PID:4244
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74.3MB
MD54cebbcb292215a2104d7846c32d5a3dc
SHA1650215efe86e97834da73580d770d4edbee594bd
SHA25617866b7f400b0b1fc2e24c33a7ebcd6abf4097d1d720fcf82cedcda290613bcb
SHA51274aadb7ba242fe95279678e36cb7911ffdda9e22e15e6366b1193ba2307b085b8fdaa960e81562ad493942f127b586de2fa75f96a26730b8b1e657e24985b08b
-
Filesize
74.3MB
MD54cebbcb292215a2104d7846c32d5a3dc
SHA1650215efe86e97834da73580d770d4edbee594bd
SHA25617866b7f400b0b1fc2e24c33a7ebcd6abf4097d1d720fcf82cedcda290613bcb
SHA51274aadb7ba242fe95279678e36cb7911ffdda9e22e15e6366b1193ba2307b085b8fdaa960e81562ad493942f127b586de2fa75f96a26730b8b1e657e24985b08b