Analysis
-
max time kernel
124s -
max time network
96s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 15:15
Behavioral task
behavioral1
Sample
a791f9cbd81b06639d7679168a4b77b71078740c666e27829654cd1e1b13aef3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a791f9cbd81b06639d7679168a4b77b71078740c666e27829654cd1e1b13aef3.exe
Resource
win10v2004-20220901-en
General
-
Target
a791f9cbd81b06639d7679168a4b77b71078740c666e27829654cd1e1b13aef3.exe
-
Size
249KB
-
MD5
caf34966a1fdcd9cacdcba553e6f8930
-
SHA1
b7ea6b1e0dd537154d66e7756cf10f6d001c2411
-
SHA256
a791f9cbd81b06639d7679168a4b77b71078740c666e27829654cd1e1b13aef3
-
SHA512
fef412c2fca06fc0d7b1b2290fdc5edab25ccf3057efd7c9f4cf7698abc9fcdb9cd48997a50f332d8e7be96885f9b30ec40d8780cc3672bca894642375f44c6d
-
SSDEEP
6144:nhZ0sG5TE07Kzrv8QLnXapFIbpcgjDd0Q6VK5M+dW:nT0sso0IR0wp/jRCVK6R
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1780-55-0x0000000000400000-0x00000000004A3000-memory.dmp upx behavioral1/memory/1780-56-0x0000000000400000-0x00000000004A3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run a791f9cbd81b06639d7679168a4b77b71078740c666e27829654cd1e1b13aef3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\windisplay = "C:\\Users\\Admin\\AppData\\Local\\windisplay\\windisplay.exe" a791f9cbd81b06639d7679168a4b77b71078740c666e27829654cd1e1b13aef3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.