Analysis
-
max time kernel
49s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10/02/2023, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe
Resource
win10v2004-20220812-en
General
-
Target
130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe
-
Size
499KB
-
MD5
501d5418681edce0926a1b304a5b5520
-
SHA1
78d5b7011af3d0368558f383fd6cdc27d47c3d94
-
SHA256
130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334
-
SHA512
0c2a786de6afc3120005e6f4cfaaca3404ff0ff1a24ed1a2d6f64b56d3c43e0880ae6c9a1707893ad59fc712042de3562ad820b15e7e13537aebeb448c74ebd9
-
SSDEEP
12288:+vftpmiUkPEKJ2b17t1GZbq96IIvRKGpqx8AGDf:+HjmA6Zt1Gpo6IGRKGsx1GD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1320 cmd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/952-55-0x0000000000400000-0x0000000000488000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1344 PING.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 952 wrote to memory of 1320 952 130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe 27 PID 952 wrote to memory of 1320 952 130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe 27 PID 952 wrote to memory of 1320 952 130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe 27 PID 952 wrote to memory of 1320 952 130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe 27 PID 1320 wrote to memory of 1344 1320 cmd.exe 29 PID 1320 wrote to memory of 1344 1320 cmd.exe 29 PID 1320 wrote to memory of 1344 1320 cmd.exe 29 PID 1320 wrote to memory of 1344 1320 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe"C:\Users\Admin\AppData\Local\Temp\130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping 127.0.0.1 -n 3&del /q "C:\Users\Admin\AppData\Local\Temp\130420dd4e45b3f99d2c58fced5af5efbdc3a10726dde9326c27dcba95320334.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:1344
-
-