Analysis
-
max time kernel
31s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/03/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
4 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
2.8MB
-
MD5
a1f7bd3a021e8c779ee8dab8b13aa875
-
SHA1
d097479513bc57e740220dee1a03820b4f2b3b7c
-
SHA256
bcb7f74cabff9b520fccd6afa1f8d6711fc004b4ad13c49849ee90978fc7873e
-
SHA512
0e536c7a11cc7074d2847fd85eb8ac99e4e0d421d7f27838b55f14d500d8557dc7cde76b57f009e6b40118caa11f042305d926addadad5c241ae496a94e28a12
-
SSDEEP
24576:NDVF5mkwaAr+A+7eGNkqFp4/Bma+mxY4eHGs8E9Ot09OX7l348A5NyvCh1WGn0LZ:LuL3r+A+/N/L4/BFxY+CYfORu4cIPA
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2008 powershell.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe 1704 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2008 powershell.exe Token: SeDebugPrivilege 1704 tmp.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2008 1704 tmp.exe 26 PID 1704 wrote to memory of 2008 1704 tmp.exe 26 PID 1704 wrote to memory of 2008 1704 tmp.exe 26 PID 1704 wrote to memory of 1692 1704 tmp.exe 29 PID 1704 wrote to memory of 1692 1704 tmp.exe 29 PID 1704 wrote to memory of 1692 1704 tmp.exe 29 PID 1704 wrote to memory of 948 1704 tmp.exe 30 PID 1704 wrote to memory of 948 1704 tmp.exe 30 PID 1704 wrote to memory of 948 1704 tmp.exe 30 PID 1704 wrote to memory of 1664 1704 tmp.exe 31 PID 1704 wrote to memory of 1664 1704 tmp.exe 31 PID 1704 wrote to memory of 1664 1704 tmp.exe 31 PID 1704 wrote to memory of 1720 1704 tmp.exe 32 PID 1704 wrote to memory of 1720 1704 tmp.exe 32 PID 1704 wrote to memory of 1720 1704 tmp.exe 32 PID 1704 wrote to memory of 1436 1704 tmp.exe 33 PID 1704 wrote to memory of 1436 1704 tmp.exe 33 PID 1704 wrote to memory of 1436 1704 tmp.exe 33 PID 1704 wrote to memory of 1548 1704 tmp.exe 34 PID 1704 wrote to memory of 1548 1704 tmp.exe 34 PID 1704 wrote to memory of 1548 1704 tmp.exe 34 PID 1704 wrote to memory of 1108 1704 tmp.exe 35 PID 1704 wrote to memory of 1108 1704 tmp.exe 35 PID 1704 wrote to memory of 1108 1704 tmp.exe 35 PID 1704 wrote to memory of 876 1704 tmp.exe 36 PID 1704 wrote to memory of 876 1704 tmp.exe 36 PID 1704 wrote to memory of 876 1704 tmp.exe 36 PID 1704 wrote to memory of 1020 1704 tmp.exe 37 PID 1704 wrote to memory of 1020 1704 tmp.exe 37 PID 1704 wrote to memory of 1020 1704 tmp.exe 37 PID 1704 wrote to memory of 1100 1704 tmp.exe 38 PID 1704 wrote to memory of 1100 1704 tmp.exe 38 PID 1704 wrote to memory of 1100 1704 tmp.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1692
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:948
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:1100
-