Analysis
-
max time kernel
39s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 19:35
Static task
static1
Behavioral task
behavioral1
Sample
9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe
Resource
win10v2004-20220812-en
Errors
General
-
Target
9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe
-
Size
46KB
-
MD5
1df37bf80005a70869240317bf28d82e
-
SHA1
b260cc1b368a4e05966ba10c466f67ff2249afea
-
SHA256
9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0
-
SHA512
8b07d00c6dd57ae6a32efd404f36446ac24653e5a9bc6b134b257f7eae07478a493a4f9327d21b672cb02105891772ae925d2692989904d47514e2b3ea7f7082
-
SSDEEP
768:vMdlEI79nFyqibLT6tjlR31P85Mtz9jlxPrC4GyviTROKw06FGO7vNYPGa:vMd/79n7WLT6t3lP3zBv1vis06AuqPd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1572 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\180046341 = "C:\\Users\\Admin\\180046341.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe Token: SeShutdownPrivilege 1760 shutdown.exe Token: SeRemoteShutdownPrivilege 1760 shutdown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1400 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 26 PID 1508 wrote to memory of 1400 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 26 PID 1508 wrote to memory of 1400 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 26 PID 1508 wrote to memory of 1400 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 26 PID 1400 wrote to memory of 1080 1400 cmd.exe 28 PID 1400 wrote to memory of 1080 1400 cmd.exe 28 PID 1400 wrote to memory of 1080 1400 cmd.exe 28 PID 1400 wrote to memory of 1080 1400 cmd.exe 28 PID 1508 wrote to memory of 1760 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 29 PID 1508 wrote to memory of 1760 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 29 PID 1508 wrote to memory of 1760 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 29 PID 1508 wrote to memory of 1760 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 29 PID 1508 wrote to memory of 1572 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 31 PID 1508 wrote to memory of 1572 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 31 PID 1508 wrote to memory of 1572 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 31 PID 1508 wrote to memory of 1572 1508 9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe"C:\Users\Admin\AppData\Local\Temp\9b0fbfde8af982d1694f52a771e275480477a31f176ea76e25d271dc51a110d0.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 180046341 /t REG_SZ /d "%userprofile%\180046341.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 180046341 /t REG_SZ /d "C:\Users\Admin\180046341.exe" /f3⤵
- Adds Run key to start application
PID:1080
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9B0FBF~1.EXE > nul2⤵
- Deletes itself
PID:1572
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1268
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:1536