Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe
Resource
win10v2004-20220812-en
General
-
Target
e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe
-
Size
1.4MB
-
MD5
fa48bbbdb257396e11d903cd37e1b0f6
-
SHA1
35033df957d7260f197bdaf9c8b3456caf2f20a1
-
SHA256
e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3
-
SHA512
48e0aaba22f6885791042db115a00644af178cb27cb53cd8604d8132cd2f3e1820dce0aad862b672ce8407e84d7e000d5ccaceb9d9a9706b3a81a38ce6d288f5
-
SSDEEP
24576:E0nciG2RblCP0XDUoY3Nlxl2Y42xfuHM2MidSP9Bd4hWwPXt:HciG2JIsXDUL3Nlxlo2RulMiaRw/t
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1984 2016 WerFault.exe 21 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1884 AUDIODG.EXE Token: 33 1884 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1884 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2016 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 2016 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 2016 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 2016 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1984 2016 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 30 PID 2016 wrote to memory of 1984 2016 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 30 PID 2016 wrote to memory of 1984 2016 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 30 PID 2016 wrote to memory of 1984 2016 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe"C:\Users\Admin\AppData\Local\Temp\e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 12282⤵
- Program crash
PID:1984
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1884