Analysis
-
max time kernel
27s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 07:19
Static task
static1
Behavioral task
behavioral1
Sample
ef6b09fbf95ebdf8f9d717db8422d5d15a932f231ae1e3f9aafeedbb029b385f.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ef6b09fbf95ebdf8f9d717db8422d5d15a932f231ae1e3f9aafeedbb029b385f.lnk
Resource
win10v2004-20220901-en
General
-
Target
ef6b09fbf95ebdf8f9d717db8422d5d15a932f231ae1e3f9aafeedbb029b385f.lnk
-
Size
1KB
-
MD5
33b4f449377ccec457222a03efe25688
-
SHA1
9d2fb833282cdb2bc2156d3c4dbdeb9987ebfa4c
-
SHA256
ef6b09fbf95ebdf8f9d717db8422d5d15a932f231ae1e3f9aafeedbb029b385f
-
SHA512
57a9dae627b0addaa526edf48df6cf1fd2f6cf7978e3445836c95de10ccc8919c5c80ecab2007b505ce1ff118e139fc42fa02fab81663960cdcfe9fa7dba66b1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 848 wrote to memory of 1924 848 cmd.exe 29 PID 848 wrote to memory of 1924 848 cmd.exe 29 PID 848 wrote to memory of 1924 848 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ef6b09fbf95ebdf8f9d717db8422d5d15a932f231ae1e3f9aafeedbb029b385f.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\WINDOWS\system32\cmd.exe"C:\WINDOWS\system32\cmd.exe" /c "start %cd%RECYCLER\e621ca05.exe &&C:\Windows\explorer.exe %cd%바탕연구부2⤵PID:1924
-