Analysis
-
max time kernel
52s -
max time network
184s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
31/12/2022, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe
Resource
win10-20220901-en
General
-
Target
37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe
-
Size
927KB
-
MD5
21e10975918a63457d1a007e369791db
-
SHA1
610eb4e626a8ab1edbd5a9e94c4f68fd9672c264
-
SHA256
37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb
-
SHA512
01c8d2b2c169741ecda4dccf0b7712bee8f99cbfe05f98429bf757abcb6dbe08145915ca45e9119d58e1182b08c31fe4bfe6dba05e9a1a9f28f3783d888ab873
-
SSDEEP
12288:wslS8sNT68K0z+DKkkzlNz26Q0rXdR2QjbghEivEZqAasmjJW3s4yCWXmq42:w6S8sZo8zlNz2umgbgh9vlAtmjJssb42
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 804 959392127-j0xYuta9G35m02YL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3504 37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe Token: SeDebugPrivilege 804 959392127-j0xYuta9G35m02YL.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3504 wrote to memory of 804 3504 37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe 66 PID 3504 wrote to memory of 804 3504 37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe 66 PID 3504 wrote to memory of 804 3504 37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe"C:\Users\Admin\AppData\Local\Temp\37039db3666b741d1a65031170e510f509cf7a9b526dd225af7e0ce754e958eb.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\959392127-j0xYuta9G35m02YL.exe"C:\Users\Admin\AppData\Local\Temp\959392127-j0xYuta9G35m02YL.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD5c6bc2ad55ab57bb7ebe13d31d7171cd0
SHA19c8896e21fe1c27d052632c0e879f447dd4d0f02
SHA2560609cf1e4bf46c805fe7249720a0a8090aa9547b997a47fc7a5489919cbc4f80
SHA512a78ca1d6c02ab4a63c1c74d08feb637c5f3f30da80f680e59bae1752a84c9add3cf76c9039b14e27312566a1ce9fd9cbbedefb4bf467b7f742a17c0a34e7ddcd
-
Filesize
450KB
MD5c6bc2ad55ab57bb7ebe13d31d7171cd0
SHA19c8896e21fe1c27d052632c0e879f447dd4d0f02
SHA2560609cf1e4bf46c805fe7249720a0a8090aa9547b997a47fc7a5489919cbc4f80
SHA512a78ca1d6c02ab4a63c1c74d08feb637c5f3f30da80f680e59bae1752a84c9add3cf76c9039b14e27312566a1ce9fd9cbbedefb4bf467b7f742a17c0a34e7ddcd