Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 02:48
Behavioral task
behavioral1
Sample
f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe
Resource
win10v2004-20220812-en
General
-
Target
f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe
-
Size
272KB
-
MD5
902829332a81e5b73b9d2dfa0615296c
-
SHA1
a62b1a62ff9d3792e880e7f7036de6587161019f
-
SHA256
f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7
-
SHA512
4e5b92307eff2ce12439ef7eca4527926fdd25a7775993def38f92cacbd42b83ebe8425df595fa451a4018daa54f1b49f12e0c6c1d9b97505341d553f7257ed3
-
SSDEEP
6144:kuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLb:P6Wq4aaE6KwyF5L0Y2D1PqLb
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1600-56-0x0000000000400000-0x00000000004B5000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1420 cmd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1600-56-0x0000000000400000-0x00000000004B5000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 1260 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1260 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1600 wrote to memory of 1420 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe 27 PID 1600 wrote to memory of 1420 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe 27 PID 1600 wrote to memory of 1420 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe 27 PID 1600 wrote to memory of 1420 1600 f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe 27 PID 1420 wrote to memory of 1260 1420 cmd.exe 29 PID 1420 wrote to memory of 1260 1420 cmd.exe 29 PID 1420 wrote to memory of 1260 1420 cmd.exe 29 PID 1420 wrote to memory of 1260 1420 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe"C:\Users\Admin\AppData\Local\Temp\f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im "f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe" & del /f /q "C:\Users\Admin\AppData\Local\Temp\f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im "f4dfb68c90af33e52ecec42c6eb52235b2e069d211c46a9d316634b22d918cb7.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-