Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe
Resource
win10v2004-20220812-en
General
-
Target
952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe
-
Size
197KB
-
MD5
18717fa5cee48496fa166c7767314471
-
SHA1
556eadaf39e440353c22f7ac3cc36895b1594dd8
-
SHA256
952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be
-
SHA512
2b34b5e0d9fa64128067d0a16c05ba97854ee5506ec3d1c46e8215f34b5d0ba3fc47c9f08afda3b06b81ca52b280662a9ed14af334e2a879dbcda10b5c21b689
-
SSDEEP
6144:HNXIpn+aC1meyUGimMoEfPeL2GkGnisCQIz1:GJW1meyUGp8P024X6
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1600 952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1600 952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe"C:\Users\Admin\AppData\Local\Temp\952b197b07464f289d2a5b4d042b11ff30ff5c9bf60ef98e283bf39c5e1da4be.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1600