Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-12-2022 17:27
Static task
static1
Behavioral task
behavioral1
Sample
doc.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
doc.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
share.bat
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
share.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
strona_16.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
strona_16.dll
Resource
win10v2004-20220812-en
General
-
Target
doc.lnk
-
Size
1KB
-
MD5
e2d66adfe8e20d3da5912f4ddb54875c
-
SHA1
7f590eee3ac2853471da6858f8f8c904eb92d329
-
SHA256
9f0e7f8733888b0bc95df7034e1b271f96138d12bddd0224838e064639324e0a
-
SHA512
53a8bad68b6e936b24d4aff78b24503dcc3aeb7a978a1d3e7c6304a190b804de27caa71ff706cad610a37ccde62fb97c6015c2f2741fc6fac191861d41165cb7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1460 wrote to memory of 320 1460 cmd.exe 29 PID 1460 wrote to memory of 320 1460 cmd.exe 29 PID 1460 wrote to memory of 320 1460 cmd.exe 29 PID 320 wrote to memory of 568 320 cmd.exe 30 PID 320 wrote to memory of 568 320 cmd.exe 30 PID 320 wrote to memory of 568 320 cmd.exe 30 PID 320 wrote to memory of 2032 320 cmd.exe 31 PID 320 wrote to memory of 2032 320 cmd.exe 31 PID 320 wrote to memory of 2032 320 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\doc.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c share.bat2⤵
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K copy /y /b C:\Windows\System32\rundll32.exe C:\ProgramData\2PW9sUi9sE.exe3⤵PID:568
-
-
C:\Windows\system32\xcopy.exexcopy /h /y strona_16.dll C:\ProgramData3⤵PID:2032
-
-