Overview
overview
10Static
static
ONE_00034.lnk
windows7-x64
3ONE_00034.lnk
windows10-2004-x64
7ONE_00035.lnk
windows7-x64
3ONE_00035.lnk
windows10-2004-x64
7ONE_00036.lnk
windows7-x64
3ONE_00036.lnk
windows10-2004-x64
7ONE_00037.lnk
windows7-x64
3ONE_00037.lnk
windows10-2004-x64
7OneDrive.exe
windows7-x64
1OneDrive.exe
windows10-2004-x64
1secur32.dll
windows7-x64
1secur32.dll
windows10-2004-x64
10Analysis
-
max time kernel
26s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
ONE_00034.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ONE_00034.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
ONE_00035.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ONE_00035.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
ONE_00036.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
ONE_00036.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
ONE_00037.lnk
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
ONE_00037.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
OneDrive.exe
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
OneDrive.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
secur32.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
secur32.dll
Resource
win10v2004-20221111-en
General
-
Target
ONE_00035.lnk
-
Size
1KB
-
MD5
b20e99f7987ea5ead2dbdad9f02ca657
-
SHA1
7928d503eff40263855ffe23add5fbb9c0f8750b
-
SHA256
247f3bbc894e6af7d36c7d7d0a2dd9c8764fcc9fdad385e79e7d5732a2e9e1c9
-
SHA512
b2ff98aa7aa85494881d52eb092bdda2c1a243abe0ac99f4bb93784b78c8b07bc8e8bab1f5ee145068d161ef33803459a920326dc5b9b2f951fb3b1ec2a9c4d1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 1644 wrote to memory of 1792 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 1792 1644 cmd.exe cmd.exe PID 1644 wrote to memory of 1792 1644 cmd.exe cmd.exe PID 1792 wrote to memory of 1516 1792 cmd.exe OneDrive.exe PID 1792 wrote to memory of 1516 1792 cmd.exe OneDrive.exe PID 1792 wrote to memory of 1516 1792 cmd.exe OneDrive.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ONE_00035.lnk1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c start OneDrive.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\OneDrive.exeOneDrive.exe3⤵