Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe
Resource
win10v2004-20220812-en
General
-
Target
81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe
-
Size
156KB
-
MD5
510046a8c4c923f986e2bf438f15e756
-
SHA1
19f0150cc4552f45a13b8684d88a204db924f00a
-
SHA256
81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db
-
SHA512
a7f73badbdb9321a0939a7df829280f3741ad892469f57abf0e7981cff9503c3c860b9b6b7f014e8389af931c2e6d1ac09db99d9d1fbacec8059bb2f65088dd8
-
SSDEEP
3072:AYC50Rnj7RLkstRFbBObCxame6GAgk6eM25TRzz31vk6CD:BLksVBObCxame6GAgTeM251zzVO
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 460 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 460 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1488 wrote to memory of 904 1488 81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe 28 PID 1488 wrote to memory of 904 1488 81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe 28 PID 1488 wrote to memory of 904 1488 81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe 28 PID 1488 wrote to memory of 904 1488 81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe 28 PID 904 wrote to memory of 460 904 cmd.exe 30 PID 904 wrote to memory of 460 904 cmd.exe 30 PID 904 wrote to memory of 460 904 cmd.exe 30 PID 904 wrote to memory of 460 904 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe"C:\Users\Admin\AppData\Local\Temp\81f1c6cc809777bd74fde9b170e2122cbaac850e15f3a1fefd4fdf32499de8db.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 81f1c6cc809777bd74fde9b170e2122cba2⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:460
-
-