Analysis
-
max time kernel
2s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 09:26
Static task
static1
Behavioral task
behavioral1
Sample
882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe
Resource
win10v2004-20220901-en
General
-
Target
882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe
-
Size
516KB
-
MD5
0d28390bc17ec07d0f54cf7093186480
-
SHA1
40d671159b24f7dce7c5b761eddd08049286c513
-
SHA256
882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2
-
SHA512
a935c1170e6fcdbb5850339177c675a0f0ad1d92c1d68236312d49a38e21aab2edc1648106a19a1f42faa535b67fe39e7d33d43e309076aa9cb70b3ab09b2feb
-
SSDEEP
12288:0rrsK0jdMEYW9dX/OjQGYBtfWpqLTiU/n39R7tMEME:orsKWd9dIQGYBMpq7fid
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1012 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1012 2020 882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe 28 PID 2020 wrote to memory of 1012 2020 882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe 28 PID 2020 wrote to memory of 1012 2020 882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe 28 PID 2020 wrote to memory of 1012 2020 882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe"C:\Users\Admin\AppData\Local\Temp\882c95a4a0ee929be5d2b7bc36bd1bfe27c0c107c11300063526cfb54e0a77f2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\_uninsep.bat" "2⤵
- Deletes itself
PID:1012
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
341B
MD55b7da72c0eeb748cf82009c5f96c86b5
SHA14331437369b844b9a5d53c9b655159c8d1de66c0
SHA2561983a79b52abb675cc7552104a723c86da182de040a7d627f80ddffb168c16e6
SHA5124249db1b59643e2cb9373ce8caf157f2c1b291d82af7333d1e880c788e4f4a10fd415612cdec2304a986e9ff810cbb9bbf90e5d8930d45d72c66ee57cb2d7bbb