Analysis
-
max time kernel
27s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe
Resource
win10v2004-20220812-en
General
-
Target
bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe
-
Size
91KB
-
MD5
78314f07817ecde365f674f3c95460b0
-
SHA1
05e9c18c407ce9a7aa45e690db6188ba7044ab62
-
SHA256
bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805
-
SHA512
470d38afa051e1c6defabb68c1a3842bd6161f4fc2b045cf53b3f75a34769aa8964b866360855091a0b64e9aec2d8c0abd5e9d2813d797aa4e63db19fd1ca528
-
SSDEEP
1536:ix2GNnR7NXXynnVP/QRbKKKx/1PfK6yuRMt0zar+XhL:ANHGVP+YNfK65F9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1996 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1880 wrote to memory of 1996 1880 bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe 28 PID 1880 wrote to memory of 1996 1880 bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe 28 PID 1880 wrote to memory of 1996 1880 bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe 28 PID 1880 wrote to memory of 1996 1880 bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe"C:\Users\Admin\AppData\Local\Temp\bcdfb7ac778654f3531995947c9088b25cb0887b3b646ac222ea9fa46d399805.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Dtz..bat" > nul 2> nul2⤵
- Deletes itself
PID:1996
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD54b294fa19b0b8acdc4f62025df84c5e6
SHA1e6cb8b1f357698c07231f8e5ecccc49ad9de172f
SHA25685903d266a8080aafa3345b37eb41ee3480e1cba908a38fb8a253f18ef6a01c8
SHA512741da3c54580f236e7798ec4a2156f883d51a6671be4dbe270aae609dc4be06d2648e7710bddeae5dddc6b03799d97a58f0068b84a4d643111a7b6f68c3ce684