Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
f917d6d181527f9d1c16922493d9db22f3c68a8bee2fc0c2fddc5f6635caf938.lnk
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f917d6d181527f9d1c16922493d9db22f3c68a8bee2fc0c2fddc5f6635caf938.lnk
Resource
win10v2004-20220812-en
General
-
Target
f917d6d181527f9d1c16922493d9db22f3c68a8bee2fc0c2fddc5f6635caf938.lnk
-
Size
1KB
-
MD5
ecc53a8ce33cc2d66ffb7caed81d57d6
-
SHA1
9fb623b0c66fff3eb84f8262aaa2cce4ce3323ab
-
SHA256
f917d6d181527f9d1c16922493d9db22f3c68a8bee2fc0c2fddc5f6635caf938
-
SHA512
a7595b5efa68d820e92a58126a1fca8a0cb2fa6ec22044b8aae83328946728a6e681aa390dcf254ce40069fb8fbbb6e95ea33ff55b7f85ece7b453a11ec9ee8a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1228 wrote to memory of 1736 1228 cmd.exe 28 PID 1228 wrote to memory of 1736 1228 cmd.exe 28 PID 1228 wrote to memory of 1736 1228 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f917d6d181527f9d1c16922493d9db22f3c68a8bee2fc0c2fddc5f6635caf938.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\WINDOWS\system32\cmd.exe"C:\WINDOWS\system32\cmd.exe" /c "start %cd%RECYCLER\6dc09d8d.exe &&C:\Windows\explorer.exe %cd%RECYCLING2⤵PID:1736
-