Analysis
-
max time kernel
184s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 18:49
Static task
static1
Behavioral task
behavioral1
Sample
af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe
Resource
win10v2004-20220812-en
General
-
Target
af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe
-
Size
270KB
-
MD5
db69e53ac1a76f0effd2e423571c1e58
-
SHA1
cfab20189562782fe27b44263d71c78ee13b733a
-
SHA256
af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68
-
SHA512
ccfdfc4c4ad0a71c3de218fc58d8176970b09baaa2c7e250840c7d01ebd685491054bb8c33dca48bb6f78466a512dd7c7617dde0c9d14747a7748a28bdd91bbc
-
SSDEEP
6144:8OpvjcZo+N2H/tq/iJ57CIikUxIGod3XzC/9va7d6g1rvN:TpQZJN2HVq/iv7dikUXgw9vWAAl
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4544 NVIDIA .dll -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\NVIDIA .dll af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4296 af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe 4296 af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe 4296 af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe 4296 af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe 4296 af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe 4296 af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe 4544 NVIDIA .dll 4544 NVIDIA .dll -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4544 NVIDIA .dll -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4544 wrote to memory of 3396 4544 NVIDIA .dll 79 PID 4544 wrote to memory of 3396 4544 NVIDIA .dll 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe"C:\Users\Admin\AppData\Local\Temp\af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:4296
-
C:\Windows\NVIDIA .dll"C:\Windows\NVIDIA .dll"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" 555552⤵PID:3396
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD5db69e53ac1a76f0effd2e423571c1e58
SHA1cfab20189562782fe27b44263d71c78ee13b733a
SHA256af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68
SHA512ccfdfc4c4ad0a71c3de218fc58d8176970b09baaa2c7e250840c7d01ebd685491054bb8c33dca48bb6f78466a512dd7c7617dde0c9d14747a7748a28bdd91bbc
-
Filesize
270KB
MD5db69e53ac1a76f0effd2e423571c1e58
SHA1cfab20189562782fe27b44263d71c78ee13b733a
SHA256af1490ee716aec1ba60305997db64debb0c037b1271cc1633f3577476e423a68
SHA512ccfdfc4c4ad0a71c3de218fc58d8176970b09baaa2c7e250840c7d01ebd685491054bb8c33dca48bb6f78466a512dd7c7617dde0c9d14747a7748a28bdd91bbc