Analysis
-
max time kernel
40s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 19:09
Static task
static1
Behavioral task
behavioral1
Sample
c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe
Resource
win10v2004-20220901-en
General
-
Target
c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe
-
Size
72KB
-
MD5
34f152747adcac221c70a283ac44926d
-
SHA1
08ea22cbf13975a19ec0efda2473adb6b1c4e55a
-
SHA256
c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c
-
SHA512
230dd820dab4347a3d74d15d0d686353c40231c59528cf3bb31b06502ced208228a48ee40bd095595cb74c104f1b498fc286fc91173ada5721a9e79060fef3e8
-
SSDEEP
768:9KQ1iS/KkOCfJb4kHrgrTi6yBJJyNKJCviXDyiwSuo6zCNKVzI7:sgXirEJycA8Dy9Suo6zCso
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1492 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: 33 1988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1988 AUDIODG.EXE Token: 33 1988 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1988 AUDIODG.EXE Token: SeDebugPrivilege 1492 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1448 1488 c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe 29 PID 1488 wrote to memory of 1448 1488 c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe 29 PID 1488 wrote to memory of 1448 1488 c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe 29 PID 1488 wrote to memory of 1448 1488 c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe 29 PID 1448 wrote to memory of 1492 1448 cmd.exe 31 PID 1448 wrote to memory of 1492 1448 cmd.exe 31 PID 1448 wrote to memory of 1492 1448 cmd.exe 31 PID 1448 wrote to memory of 1492 1448 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe"C:\Users\Admin\AppData\Local\Temp\c7cb75c28ac0df730287020b3c5072dea3abe9c2651f0eaaa08742124a26175c.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del c7cb75c28ac0df730287020b3c5072dea32⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1d01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1988