Analysis
-
max time kernel
2s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
08-12-2022 19:34
Static task
static1
Behavioral task
behavioral1
Sample
conf.bat
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
conf.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
list.lnk
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
list.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
tutorials.dll
Resource
win7-20221111-en
General
-
Target
list.lnk
-
Size
1KB
-
MD5
6d6c8abcd4144c4ea09d7f1b759d93b7
-
SHA1
9141c9c89ce1fe76bffd88c4aa1d6c4c0b2ccbbc
-
SHA256
068901e007a00393ac50592d599b473149fae5f1b559b6240952f3866a167973
-
SHA512
80f8bceb3c8978b8da3a4387dc43b2cb647cc89d5fd2e347dd6fcbe74ca2733b5a14921f883ba0d741f2a7ce4e32e605ab81d799664d56f3bc71fe3912010547
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1760 1460 cmd.exe 29 PID 1460 wrote to memory of 1760 1460 cmd.exe 29 PID 1460 wrote to memory of 1760 1460 cmd.exe 29 PID 1760 wrote to memory of 760 1760 cmd.exe 30 PID 1760 wrote to memory of 760 1760 cmd.exe 30 PID 1760 wrote to memory of 760 1760 cmd.exe 30 PID 1760 wrote to memory of 1872 1760 cmd.exe 31 PID 1760 wrote to memory of 1872 1760 cmd.exe 31 PID 1760 wrote to memory of 1872 1760 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\list.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c conf.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K copy /y /b C:\Windows\System32\rundll32.exe C:\ProgramData\DAGLhBmCYpVOD.exe3⤵PID:760
-
-
C:\Windows\system32\xcopy.exexcopy /h /y tutorials.dll C:\ProgramData3⤵PID:1872
-
-