Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
16-12-2022 14:31
Static task
static1
Behavioral task
behavioral1
Sample
devx_foot2.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
devx_foot2.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
forum_old.bat
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
forum_old.bat
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
license.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
license.lnk
Resource
win10v2004-20221111-en
General
-
Target
forum_old.bat
-
Size
3KB
-
MD5
eee1b1a971d11cd922794259e8006d7b
-
SHA1
f2b1c84fd1827ff58c3b37f29c70894482de96e9
-
SHA256
797cd9e3fb2a444e43e46a54de5c354ea92f36818e73640fd05d2989bb9693cc
-
SHA512
092e7318e3c15b5d22b4303238be255ad98a06bb9398cb02cb6f25e3b2d4e160242b5005a736ccf1da11fc65cf7cff0f292b1a4c68d962eb2062e75f936dcf1d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1068 wrote to memory of 1108 1068 cmd.exe 29 PID 1068 wrote to memory of 1108 1068 cmd.exe 29 PID 1068 wrote to memory of 1108 1068 cmd.exe 29 PID 1068 wrote to memory of 2012 1068 cmd.exe 30 PID 1068 wrote to memory of 2012 1068 cmd.exe 30 PID 1068 wrote to memory of 2012 1068 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\forum_old.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K copy /y /b C:\Windows\System32\rundll32.exe C:\ProgramData\kyR1JyHYpWnDvn.exe2⤵PID:1108
-
-
C:\Windows\system32\xcopy.exexcopy /h /y devx_foot2.dll C:\ProgramData2⤵PID:2012
-