Analysis
-
max time kernel
25s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe
Resource
win10v2004-20220812-en
General
-
Target
cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe
-
Size
78KB
-
MD5
404695e86ca09ff22ec99035118e5e6d
-
SHA1
c1c61a414206f36fddae3b71eb891c8549194abc
-
SHA256
cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223
-
SHA512
aa97a036f34895894d4513f44a02865ad38c4f30d221ec0035151257a9dd5a06ba64d36fa2af1ae24761725142257653b7a6895a5263d5e7a6015b0f2300e6f2
-
SSDEEP
1536:PhA8u9yFzgbg9Jbuij36g5meh3/zcF8M4ICTPRvYw3sEjX/:5A8wozgkubaf3rVl+EjX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1988 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1988 1944 cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe 28 PID 1944 wrote to memory of 1988 1944 cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe 28 PID 1944 wrote to memory of 1988 1944 cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe 28 PID 1944 wrote to memory of 1988 1944 cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe"C:\Users\Admin\AppData\Local\Temp\cbc0a79c69f2548c241bd89b2f8d19c4ad2275495024ddeba777889383d0e223.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Wbv..bat" > nul 2> nul2⤵
- Deletes itself
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5af94c0235c591217c1d7aafb3294f1e9
SHA192fea2e5027b3caf02d6b89226742d04aaf848e3
SHA25689f1bf52c368151884e9c06c534961c49f675b464b7552d79ce7993af33dbc9a
SHA5120883abf6da998ed150b1e1ba232d9f77f11844b06a02470b588faf5889a670d79e4742656404c03e651bfb447e5ba8f1286b7201e8bc8df6f5c82d542a78b922