Analysis
-
max time kernel
177s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe
Resource
win10v2004-20221111-en
General
-
Target
5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe
-
Size
204KB
-
MD5
1ad3cda9681968577cf8cb72b19d2759
-
SHA1
886ab2324a47aa4c0a95f66b75bf65c467d950f4
-
SHA256
5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8
-
SHA512
ab9b02b8228878f31df06879ba6edcf76afd4463e57e87e04eea8947f30d05b6b7b3d8727faea5c4da985b484a4f830b4dc535cff8332d7395148ccd3761c900
-
SSDEEP
1536:9nhAzTzJTet/UVyFoBEpuTWti3YFCHBSRT9LA/:H2TeKVXBEpuyg3FHB4S
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1632 wrote to memory of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 PID 1632 wrote to memory of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 PID 1632 wrote to memory of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 PID 1632 wrote to memory of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 PID 1632 wrote to memory of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 PID 1632 wrote to memory of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 PID 1632 wrote to memory of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 PID 1632 wrote to memory of 2724 1632 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 82 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39 PID 2724 wrote to memory of 2644 2724 5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe"C:\Users\Admin\AppData\Local\Temp\5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe"C:\Users\Admin\AppData\Local\Temp\5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe" c:\users\admin\appdata\local\temp\Program.exe43⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724
-
-