Analysis
-
max time kernel
33s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe
Resource
win10v2004-20220812-en
General
-
Target
3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe
-
Size
88KB
-
MD5
1aa47e32f7d8ebfa1b6eb620243659a0
-
SHA1
d8711c7738aef233f300e982814e9694ae4d83f7
-
SHA256
3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069
-
SHA512
9c5f208c582c00a346d8d4a3e64a21db19a84a8b0fff364ee980d0a8d13635bec17c9054a83e5691b414de959bf83c433cba8855be19533c2bd47c8ef6e3cc0f
-
SSDEEP
1536:dawyQ/8HqveEc39FElorg8/iwHdk6SzuAatLfts4V0dVnjy+OnnUEu+coucbu:qEA9oorg8/bHdk6SzuAatLfts4KVnjyf
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1968 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1968 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1500 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1500 wrote to memory of 1992 1500 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe 28 PID 1500 wrote to memory of 1992 1500 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe 28 PID 1500 wrote to memory of 1992 1500 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe 28 PID 1500 wrote to memory of 1992 1500 3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe 28 PID 1992 wrote to memory of 1968 1992 cmd.exe 30 PID 1992 wrote to memory of 1968 1992 cmd.exe 30 PID 1992 wrote to memory of 1968 1992 cmd.exe 30 PID 1992 wrote to memory of 1968 1992 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe"C:\Users\Admin\AppData\Local\Temp\3eb6e4b6c6b240e84263d5960761c60a2bf29d3ee565932405c5e53e8b426069.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 3eb6e4b6c6b240e84263d5960761c60a2b2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-