Analysis
-
max time kernel
9s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10-02-2023 21:08
Static task
static1
Behavioral task
behavioral1
Sample
features.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
features.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
math.bat
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
math.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
project information.lnk
Resource
win7-20221111-en
General
-
Target
project information.lnk
-
Size
975B
-
MD5
c6b475cbf0af53b086df880b42c21409
-
SHA1
e8aa3b7fc99e14f92bf369efdac3f2b558914915
-
SHA256
ae981b4dd9a5b4a4d8a21250244216dc7e9ac03bd54048527f31d3554b66fad1
-
SHA512
8a9031fb1f0238c92ebf6d432b950c7f806dbb085a288f6bc0c120ff9f779a670169c320aac48784cad64b235fee845bc1e04037f18dbeb2dc5a3fcf30397dc7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1988 wrote to memory of 572 1988 cmd.exe 29 PID 1988 wrote to memory of 572 1988 cmd.exe 29 PID 1988 wrote to memory of 572 1988 cmd.exe 29 PID 572 wrote to memory of 1492 572 cmd.exe 30 PID 572 wrote to memory of 1492 572 cmd.exe 30 PID 572 wrote to memory of 1492 572 cmd.exe 30 PID 1492 wrote to memory of 296 1492 cmd.exe 31 PID 1492 wrote to memory of 296 1492 cmd.exe 31 PID 1492 wrote to memory of 296 1492 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\project information.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c math.bat2⤵
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\system32\cmd.execmd.exe /c start /b /min copy /Y C:\Windows\System32\rundll32.exe C:\ProgramData\2XvdXuWL0hw1.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K copy /Y C:\Windows\System32\rundll32.exe C:\ProgramData\2XvdXuWL0hw1.exe4⤵PID:296
-
-
-