Analysis
-
max time kernel
67s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe
Resource
win10v2004-20221111-en
Errors
General
-
Target
94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe
-
Size
80KB
-
MD5
9aa0efedff5b430297602f7b8787eb9c
-
SHA1
542343bc5624312b1c59d998e13798203cd8ded6
-
SHA256
94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6
-
SHA512
c1291a9400242cdb0e25f9303958846e23961d87ee5902f846e0a6251c8ef29e44a375019843ec65913fb462b22a404cc7ed221b348dc80020f628cc341deaa9
-
SSDEEP
768:f6NSRbJevhW4ubRhe9pOU96U6NJvGyFU7bS08ZPzHNYM/rrNs/sHzDgxCkC5HVY6:jJev3S7ertoUi/GbT8LHNnrrqcgyHyP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 268 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\1131418599 = "C:\\Users\\Admin\\1131418599.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe Token: SeShutdownPrivilege 568 shutdown.exe Token: SeRemoteShutdownPrivilege 568 shutdown.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2036 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 28 PID 1060 wrote to memory of 2036 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 28 PID 1060 wrote to memory of 2036 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 28 PID 1060 wrote to memory of 2036 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 28 PID 2036 wrote to memory of 868 2036 cmd.exe 30 PID 2036 wrote to memory of 868 2036 cmd.exe 30 PID 2036 wrote to memory of 868 2036 cmd.exe 30 PID 2036 wrote to memory of 868 2036 cmd.exe 30 PID 1060 wrote to memory of 568 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 31 PID 1060 wrote to memory of 568 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 31 PID 1060 wrote to memory of 568 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 31 PID 1060 wrote to memory of 568 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 31 PID 1060 wrote to memory of 268 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 33 PID 1060 wrote to memory of 268 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 33 PID 1060 wrote to memory of 268 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 33 PID 1060 wrote to memory of 268 1060 94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe"C:\Users\Admin\AppData\Local\Temp\94c06f8cb013bf9b2fcc27bd46044ae883f7363370f77425b78e0a2fb297d8b6.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 1131418599 /t REG_SZ /d "%userprofile%\1131418599.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 1131418599 /t REG_SZ /d "C:\Users\Admin\1131418599.exe" /f3⤵
- Adds Run key to start application
PID:868
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\94C06F~1.EXE > nul2⤵
- Deletes itself
PID:268
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1484
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1900