Analysis
-
max time kernel
45s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 20:51
Static task
static1
Behavioral task
behavioral1
Sample
shangpxiangxi.exe
Resource
win7-20220901-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
shangpxiangxi.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
shangpxiangxi.exe
-
Size
260.9MB
-
MD5
1a7a23471084a672f9c99457e268afce
-
SHA1
c48c89984d2f07461a6f67652b3698be0bf9c608
-
SHA256
87fd50508f76b947d7f58703d3a64ac1728e22a54320f815760134707238310c
-
SHA512
38c7c7a2aa40446a61bdd276332ad5d900adb6123dd5f43902494ea2fd453fbda002bab3494f436f0f5cbfda0f404331b3a08fc9be182a9ec44c1062180569c4
-
SSDEEP
12288:NzEgeXjDZVH0ppMKjO4Tw9Rq6BhuSsTezDxum/hOnZMjt4aSYXiQrnWXrONJ8Q:NoX/b8pO4awaZDx3/Wwt4ajnOrC
Score
8/10
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run shangpxiangxi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ = "C:\\Users\\Admin\\Documents\\saobao\\x.exe" shangpxiangxi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe 948 shangpxiangxi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 948 shangpxiangxi.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 948 shangpxiangxi.exe