Analysis

  • max time kernel
    177s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 22:28

General

  • Target

    5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe

  • Size

    204KB

  • MD5

    1ad3cda9681968577cf8cb72b19d2759

  • SHA1

    886ab2324a47aa4c0a95f66b75bf65c467d950f4

  • SHA256

    5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8

  • SHA512

    ab9b02b8228878f31df06879ba6edcf76afd4463e57e87e04eea8947f30d05b6b7b3d8727faea5c4da985b484a4f830b4dc535cff8332d7395148ccd3761c900

  • SSDEEP

    1536:9nhAzTzJTet/UVyFoBEpuTWti3YFCHBSRT9LA/:H2TeKVXBEpuyg3FHB4S

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2644
      • C:\Users\Admin\AppData\Local\Temp\5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe
        "C:\Users\Admin\AppData\Local\Temp\5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1632
        • C:\Users\Admin\AppData\Local\Temp\5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe
          "C:\Users\Admin\AppData\Local\Temp\5540f542c8fce030c0b1a0e8b54f69f896d0428ca28139becd5781800dd007d8.exe" c:\users\admin\appdata\local\temp\Program.exe4
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2724

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1632-132-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/1632-139-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2724-136-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2724-138-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB

    • memory/2724-140-0x0000000000400000-0x0000000000405000-memory.dmp

      Filesize

      20KB