Analysis
-
max time kernel
105s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/02/2023, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
21fc808d0840be3366ef79e5a15c51a4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21fc808d0840be3366ef79e5a15c51a4.exe
Resource
win10v2004-20220812-en
General
-
Target
21fc808d0840be3366ef79e5a15c51a4.exe
-
Size
1.3MB
-
MD5
21fc808d0840be3366ef79e5a15c51a4
-
SHA1
c9c3d63a7fa8f99766fb0560dd14a70e90e57c4a
-
SHA256
218150c8d3e13fd5de782d48a45433b76d64a4f82feb9e4853543b1c8a9a1498
-
SHA512
8a31f7f6a13ac29bab131af93908f76434457039d6be69158bbc7991bb73d5871fed2cb16ef68076ba614128fdeb73c30043f038cb4e2f41d1d311c2554361fa
-
SSDEEP
12288:X2hfjFNHUaymttZedE59j8fmVuXQ54jNg6QDloO7pe54ZHW4WASSxqHs9Enat0N+:QjDUaFbwWqW6H5QHWjiqH67V0AMwrdb
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 21fc808d0840be3366ef79e5a15c51a4.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 21fc808d0840be3366ef79e5a15c51a4.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1032 powershell.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe 2036 21fc808d0840be3366ef79e5a15c51a4.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1032 powershell.exe Token: SeDebugPrivilege 2036 21fc808d0840be3366ef79e5a15c51a4.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1032 2036 21fc808d0840be3366ef79e5a15c51a4.exe 27 PID 2036 wrote to memory of 1032 2036 21fc808d0840be3366ef79e5a15c51a4.exe 27 PID 2036 wrote to memory of 1032 2036 21fc808d0840be3366ef79e5a15c51a4.exe 27 PID 2036 wrote to memory of 1532 2036 21fc808d0840be3366ef79e5a15c51a4.exe 30 PID 2036 wrote to memory of 1532 2036 21fc808d0840be3366ef79e5a15c51a4.exe 30 PID 2036 wrote to memory of 1532 2036 21fc808d0840be3366ef79e5a15c51a4.exe 30 PID 2036 wrote to memory of 2028 2036 21fc808d0840be3366ef79e5a15c51a4.exe 31 PID 2036 wrote to memory of 2028 2036 21fc808d0840be3366ef79e5a15c51a4.exe 31 PID 2036 wrote to memory of 2028 2036 21fc808d0840be3366ef79e5a15c51a4.exe 31 PID 2036 wrote to memory of 2020 2036 21fc808d0840be3366ef79e5a15c51a4.exe 32 PID 2036 wrote to memory of 2020 2036 21fc808d0840be3366ef79e5a15c51a4.exe 32 PID 2036 wrote to memory of 2020 2036 21fc808d0840be3366ef79e5a15c51a4.exe 32 PID 2036 wrote to memory of 1400 2036 21fc808d0840be3366ef79e5a15c51a4.exe 33 PID 2036 wrote to memory of 1400 2036 21fc808d0840be3366ef79e5a15c51a4.exe 33 PID 2036 wrote to memory of 1400 2036 21fc808d0840be3366ef79e5a15c51a4.exe 33 PID 2036 wrote to memory of 1928 2036 21fc808d0840be3366ef79e5a15c51a4.exe 34 PID 2036 wrote to memory of 1928 2036 21fc808d0840be3366ef79e5a15c51a4.exe 34 PID 2036 wrote to memory of 1928 2036 21fc808d0840be3366ef79e5a15c51a4.exe 34 PID 2036 wrote to memory of 1852 2036 21fc808d0840be3366ef79e5a15c51a4.exe 35 PID 2036 wrote to memory of 1852 2036 21fc808d0840be3366ef79e5a15c51a4.exe 35 PID 2036 wrote to memory of 1852 2036 21fc808d0840be3366ef79e5a15c51a4.exe 35 PID 2036 wrote to memory of 1172 2036 21fc808d0840be3366ef79e5a15c51a4.exe 36 PID 2036 wrote to memory of 1172 2036 21fc808d0840be3366ef79e5a15c51a4.exe 36 PID 2036 wrote to memory of 1172 2036 21fc808d0840be3366ef79e5a15c51a4.exe 36 PID 2036 wrote to memory of 1888 2036 21fc808d0840be3366ef79e5a15c51a4.exe 37 PID 2036 wrote to memory of 1888 2036 21fc808d0840be3366ef79e5a15c51a4.exe 37 PID 2036 wrote to memory of 1888 2036 21fc808d0840be3366ef79e5a15c51a4.exe 37 PID 2036 wrote to memory of 1060 2036 21fc808d0840be3366ef79e5a15c51a4.exe 38 PID 2036 wrote to memory of 1060 2036 21fc808d0840be3366ef79e5a15c51a4.exe 38 PID 2036 wrote to memory of 1060 2036 21fc808d0840be3366ef79e5a15c51a4.exe 38 PID 2036 wrote to memory of 1472 2036 21fc808d0840be3366ef79e5a15c51a4.exe 39 PID 2036 wrote to memory of 1472 2036 21fc808d0840be3366ef79e5a15c51a4.exe 39 PID 2036 wrote to memory of 1472 2036 21fc808d0840be3366ef79e5a15c51a4.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe"C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAANAA1AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:1400
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:1060
-
-
C:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exeC:\Users\Admin\AppData\Local\Temp\21fc808d0840be3366ef79e5a15c51a4.exe2⤵PID:1472
-