Analysis
-
max time kernel
224s -
max time network
346s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 19:47
Static task
static1
Behavioral task
behavioral1
Sample
bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe
Resource
win10v2004-20220812-en
General
-
Target
bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe
-
Size
4.0MB
-
MD5
dcc1e9ae4889afdd37011d7c736a6e3c
-
SHA1
4dd50d7b6d90fc2ba8a674370119896074946679
-
SHA256
bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595
-
SHA512
0c136136e7a63585a1c05e6a18c09ddff13339e3e5ba4fba763b04b253b3f302265801ea33602a2c2e075319a3d70b63e19e0e6baf8030fb1b245ce64b8e6e51
-
SSDEEP
98304:5QT0r4bf5EpgN+XIvmgJjB4kMNJlfzoSqzChB+Ji1HwSykHP6rB:Hr4bfmW+iHVBpmJhCzAB+Ji1HHy+yrB
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 560 bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe 560 bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe 560 bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe 560 bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe 560 bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe 560 bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 560 bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1204 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1204 AUDIODG.EXE Token: 33 1204 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1204 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe"C:\Users\Admin\AppData\Local\Temp\bfd0c3464b5a707a14c682a75fadf4f5b787b44ff8d2783078137e45e42c6595.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:560
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5281⤵
- Suspicious use of AdjustPrivilegeToken
PID:1204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD586f1895ae8c5e8b17d99ece768a70732
SHA1d5502a1d00787d68f548ddeebbde1eca5e2b38ca
SHA2568094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
SHA5123b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da
-
Filesize
4KB
MD503a477dd69bd11877e2ac1953947c400
SHA1e33881e8203674cc94bc9fcbde3e1f65ed4be5c7
SHA25603c50276af73bb72b533f8936a57bbabe41e3b7d5e24cf60eb32f3b9df2cdd61
SHA512c8d657199b7c2e2d3c9d76897426b1b9f227bd9d341481f059ab1ae6d79514e94620ec6434e32a6a07095350c90a80bfa46384cef12e309ba6f661d2ddac81af
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
3KB
MD59c3488b5e9655d1837c3963ecec33f70
SHA1f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3
SHA25605ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a
SHA5126af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7
-
Filesize
12KB
MD5cce5450725a9429a1d3c7aa851d40e8d
SHA105722500e42757ac03f2558452a064b906e31937
SHA256d850c786a68df9520a3ecf2a96f4f091c9bae71d3adbf7731e8c172533cb266d
SHA5123ddb56429e097ecf942e8a5147ba4c4191c52b736df267934f0dca75ffa74faffee8911dda47c5d2542f91138abbcaf61be3e3d68b368631d6bc21e254b5c637
-
Filesize
10KB
MD524a04541a0d2312e472f8236fd205ea8
SHA1c47eeee6fc23590311f2860d80baa954386a8ce9
SHA25674d7ac9e94305c3d30cfc19279ee73fa891bd5ae8800610dee391d1880825e19
SHA51265e061d2776bc0db53ea8aa35fb50152818c74fa9735f1a5a370315c4dacaf2cb79374ec59174d86c2e87f5b0bb8662f8cee6ff97ae93261c9a9a05bd3cc1adf