Analysis
-
max time kernel
42s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
686734ad327c83c4bd16a12d9e588567fb1b21da09bb599922580a25e0f8620f.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
686734ad327c83c4bd16a12d9e588567fb1b21da09bb599922580a25e0f8620f.lnk
Resource
win10v2004-20221111-en
General
-
Target
686734ad327c83c4bd16a12d9e588567fb1b21da09bb599922580a25e0f8620f.lnk
-
Size
1KB
-
MD5
10752099b0779adf2e5e53271b15eed0
-
SHA1
9ec5113fd381dbffaff0c10c7ae1be1e0ae73ac8
-
SHA256
686734ad327c83c4bd16a12d9e588567fb1b21da09bb599922580a25e0f8620f
-
SHA512
0367ce4c44d15bbe16d0d6344c52b7e2f754c2b920b8e3b9b7d3e3a78741f1bbde587857f500223ede896ffc8293d691731f31c736e9ec5fe1c9e4d24e428b53
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1564 1304 cmd.exe 28 PID 1304 wrote to memory of 1564 1304 cmd.exe 28 PID 1304 wrote to memory of 1564 1304 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\686734ad327c83c4bd16a12d9e588567fb1b21da09bb599922580a25e0f8620f.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "start %cd%RECYCLER\e5188982.exe &&C:\Windows\explorer.exe %cd%Export เช้า2⤵PID:1564
-