Analysis
-
max time kernel
50s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 09:42
Static task
static1
Behavioral task
behavioral1
Sample
94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe
Resource
win10v2004-20220901-en
General
-
Target
94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe
-
Size
128KB
-
MD5
df385ff4541f334df4de1a6640fb95f7
-
SHA1
7b422cbbd5bf267665e8a689bea0c6fbae04985a
-
SHA256
94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e
-
SHA512
0da1d7c9e6c230e08c0e6b994f0792d2cf163601fad91ad5ed8a7b18c9478cabc6f9eac931279d10b597ab5445805ac3f955a1de79902b40bd3faee9d258baa8
-
SSDEEP
3072:mih22PhXQIX16EB3+CMpFd4d4duDJ/Hoi4dED:mih2AhAWoBpF+jJR
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 612 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 612 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2036 94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1616 2036 94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe 30 PID 2036 wrote to memory of 1616 2036 94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe 30 PID 2036 wrote to memory of 1616 2036 94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe 30 PID 2036 wrote to memory of 1616 2036 94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe 30 PID 1616 wrote to memory of 612 1616 cmd.exe 32 PID 1616 wrote to memory of 612 1616 cmd.exe 32 PID 1616 wrote to memory of 612 1616 cmd.exe 32 PID 1616 wrote to memory of 612 1616 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe"C:\Users\Admin\AppData\Local\Temp\94fd2ece3a373167d4b7da6eea1b6819b7bc3ed865e304c4647225341c79662e.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 94fd2ece3a373167d4b7da6eea1b6819b72⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:612
-
-