Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-03-2023 23:43
Static task
static1
Behavioral task
behavioral1
Sample
DOCS.exe
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
DOCS.exe
Resource
win10v2004-20230220-en
windows10-2004-x64
13 signatures
150 seconds
General
-
Target
DOCS.exe
-
Size
2.4MB
-
MD5
072ae884ff0b7f872b2d096c6f56cd8f
-
SHA1
ed6fe1c2cf2ade73266d7110bcc24d9b26651aa0
-
SHA256
060c14947ec75ce9817f7be911534e3e15a797dc17680acc2f05d8afbffdc1c1
-
SHA512
d8949a16c6b2b305345d73652ccdbe125eb4eb0a14a2811b0618f91717436fd61bfa5475846c7e4af93dc638c309bfea3c5ef6ecbcfe08aeaef5d98da16133b5
-
SSDEEP
24576:F3HAfWxfLwk0u2QynLyw//0gLTi+hxAL0CD2iFGo1V8nJp5bN+Zr3GiK3CvbRNOU:VjwR0nLkiRYr+Zr2iK3CvbRNO/j
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000\Software\Microsoft\Windows\CurrentVersion\Run\Holzupo = "\"C:\\Users\\Admin\\AppData\\Roaming\\Jipaxzr\\Holzupo.exe\"" DOCS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2032 powershell.exe 1288 DOCS.exe 1288 DOCS.exe 1288 DOCS.exe 1288 DOCS.exe 1288 DOCS.exe 1288 DOCS.exe 1288 DOCS.exe 1288 DOCS.exe 1288 DOCS.exe 1288 DOCS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2032 powershell.exe Token: SeDebugPrivilege 1288 DOCS.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2032 1288 DOCS.exe 28 PID 1288 wrote to memory of 2032 1288 DOCS.exe 28 PID 1288 wrote to memory of 2032 1288 DOCS.exe 28 PID 1288 wrote to memory of 2032 1288 DOCS.exe 28 PID 1288 wrote to memory of 680 1288 DOCS.exe 30 PID 1288 wrote to memory of 680 1288 DOCS.exe 30 PID 1288 wrote to memory of 680 1288 DOCS.exe 30 PID 1288 wrote to memory of 680 1288 DOCS.exe 30 PID 1288 wrote to memory of 968 1288 DOCS.exe 31 PID 1288 wrote to memory of 968 1288 DOCS.exe 31 PID 1288 wrote to memory of 968 1288 DOCS.exe 31 PID 1288 wrote to memory of 968 1288 DOCS.exe 31 PID 1288 wrote to memory of 880 1288 DOCS.exe 32 PID 1288 wrote to memory of 880 1288 DOCS.exe 32 PID 1288 wrote to memory of 880 1288 DOCS.exe 32 PID 1288 wrote to memory of 880 1288 DOCS.exe 32 PID 1288 wrote to memory of 1588 1288 DOCS.exe 33 PID 1288 wrote to memory of 1588 1288 DOCS.exe 33 PID 1288 wrote to memory of 1588 1288 DOCS.exe 33 PID 1288 wrote to memory of 1588 1288 DOCS.exe 33 PID 1288 wrote to memory of 1352 1288 DOCS.exe 34 PID 1288 wrote to memory of 1352 1288 DOCS.exe 34 PID 1288 wrote to memory of 1352 1288 DOCS.exe 34 PID 1288 wrote to memory of 1352 1288 DOCS.exe 34 PID 1288 wrote to memory of 616 1288 DOCS.exe 35 PID 1288 wrote to memory of 616 1288 DOCS.exe 35 PID 1288 wrote to memory of 616 1288 DOCS.exe 35 PID 1288 wrote to memory of 616 1288 DOCS.exe 35 PID 1288 wrote to memory of 1696 1288 DOCS.exe 36 PID 1288 wrote to memory of 1696 1288 DOCS.exe 36 PID 1288 wrote to memory of 1696 1288 DOCS.exe 36 PID 1288 wrote to memory of 1696 1288 DOCS.exe 36 PID 1288 wrote to memory of 1700 1288 DOCS.exe 37 PID 1288 wrote to memory of 1700 1288 DOCS.exe 37 PID 1288 wrote to memory of 1700 1288 DOCS.exe 37 PID 1288 wrote to memory of 1700 1288 DOCS.exe 37 PID 1288 wrote to memory of 1368 1288 DOCS.exe 38 PID 1288 wrote to memory of 1368 1288 DOCS.exe 38 PID 1288 wrote to memory of 1368 1288 DOCS.exe 38 PID 1288 wrote to memory of 1368 1288 DOCS.exe 38 PID 1288 wrote to memory of 1516 1288 DOCS.exe 39 PID 1288 wrote to memory of 1516 1288 DOCS.exe 39 PID 1288 wrote to memory of 1516 1288 DOCS.exe 39 PID 1288 wrote to memory of 1516 1288 DOCS.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exe"C:\Users\Admin\AppData\Local\Temp\DOCS.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:616
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\DOCS.exeC:\Users\Admin\AppData\Local\Temp\DOCS.exe2⤵PID:1516
-