Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 07:52
Static task
static1
Behavioral task
behavioral1
Sample
9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe
Resource
win10v2004-20220812-en
General
-
Target
9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe
-
Size
984KB
-
MD5
3f81a99064bd80473ee96163fc3fed75
-
SHA1
b256748ad1cb820dd675f496e91e0db0d720b9d9
-
SHA256
9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440
-
SHA512
4ab6772ee37a1868f6dc0c00139e5b738d4b0066cfd2aa7c10d2e4648ec285dfec11090261b386219303fd21f8507dd1615ab17c428c8e588b75fd2db72b7505
-
SSDEEP
24576:ax4Mi4+EaWyZDAbKh6tBoJU0DuF4jovaVGMwhJE/ClpzwuI:6cEaWjrjiA4jova8Mz/ClpzwuI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main 9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1552 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1552 AUDIODG.EXE Token: 33 1552 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1552 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1324 9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe 1324 9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe 1324 9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe 1324 9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe 1324 9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe"C:\Users\Admin\AppData\Local\Temp\9eed3ed5d243b31dca29b214436391c4936744c904c38c934883072ad11f8440.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1324
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4581⤵
- Suspicious use of AdjustPrivilegeToken
PID:1552