Analysis
-
max time kernel
49s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
07/12/2022, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe
Resource
win10v2004-20221111-en
General
-
Target
27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe
-
Size
132KB
-
MD5
cc631ce258a788bc2a87894b0bc20f96
-
SHA1
33628af53cf100343dfbeda502eee8bce23d34e7
-
SHA256
27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed
-
SHA512
13a2b388517c5b644853a4ffb8b911475f87f0e0ee1467bfb9c45c44161590e85fabcb85794911fa9ebbbffad551eb05b2f135d8c21950828b6dfbcadaaba4ae
-
SSDEEP
1536:Znwemrk/AoZUquSKg8iomZqftJ5dXUj9GdHptP:eLk/AsDuS+ixZqftJ/XUj9GpPP
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 604 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 604 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1156 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1072 1156 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe 30 PID 1156 wrote to memory of 1072 1156 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe 30 PID 1156 wrote to memory of 1072 1156 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe 30 PID 1156 wrote to memory of 1072 1156 27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe 30 PID 1072 wrote to memory of 604 1072 cmd.exe 32 PID 1072 wrote to memory of 604 1072 cmd.exe 32 PID 1072 wrote to memory of 604 1072 cmd.exe 32 PID 1072 wrote to memory of 604 1072 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe"C:\Users\Admin\AppData\Local\Temp\27d31a0f89f567349af2d6ad1531c2df2d259f27a0692561570dfc93fad3aaed.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 27d31a0f89f567349af2d6ad1531c2df2d2⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-