Analysis
-
max time kernel
32s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
17-01-2023 22:11
Static task
static1
Behavioral task
behavioral1
Sample
b0fdb67b7034d43be60f80a2ba12bb2e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b0fdb67b7034d43be60f80a2ba12bb2e.exe
Resource
win10v2004-20221111-en
General
-
Target
b0fdb67b7034d43be60f80a2ba12bb2e.exe
-
Size
1.8MB
-
MD5
b0fdb67b7034d43be60f80a2ba12bb2e
-
SHA1
1d1c2ad7442809558ac1213013a4e475381f32c0
-
SHA256
5fc77394fd32986a32fe00746df98db40d11fb240cb6646513aec9157e104ff3
-
SHA512
c63f955cfe434ea18b25a2d7d519acb8635b0c299b81dde939a51ef2cc18ebf3502083e4b0cd8ea7362f3726b00ef67ee8d6ab2a48908b1a2b82085a2ccd7c62
-
SSDEEP
24576:NzdI/9AP+8KrCL3EZ3xHEv/fpeE7mV8dseWXaPDrwa0uporxWgLiP6S+ig5mG+GJ:raKU5xHEv/fgd8OwQuIGJ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b0fdb67b7034d43be60f80a2ba12bb2e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\chromium = "\"C:\\Users\\Admin\\AppData\\Roaming\\chromium.exe\"" b0fdb67b7034d43be60f80a2ba12bb2e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
powershell.exeb0fdb67b7034d43be60f80a2ba12bb2e.exepid process 1092 powershell.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeb0fdb67b7034d43be60f80a2ba12bb2e.exedescription pid process Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
b0fdb67b7034d43be60f80a2ba12bb2e.exedescription pid process target process PID 1280 wrote to memory of 1092 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe powershell.exe PID 1280 wrote to memory of 1092 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe powershell.exe PID 1280 wrote to memory of 1092 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe powershell.exe PID 1280 wrote to memory of 1092 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe powershell.exe PID 1280 wrote to memory of 428 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 428 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 428 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 428 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 272 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 272 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 272 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 272 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1140 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1140 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1140 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1140 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 284 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 284 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 284 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 284 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1828 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1828 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1828 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1828 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1568 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1568 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1568 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1568 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 960 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 960 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 960 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 960 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1232 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1232 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1232 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1232 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1784 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1784 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1784 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1784 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1924 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1924 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1924 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe PID 1280 wrote to memory of 1924 1280 b0fdb67b7034d43be60f80a2ba12bb2e.exe b0fdb67b7034d43be60f80a2ba12bb2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe"C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exeC:\Users\Admin\AppData\Local\Temp\b0fdb67b7034d43be60f80a2ba12bb2e.exe2⤵PID:1924