Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17/03/2023, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
service.exe
Resource
win7-20230220-en
General
-
Target
service.exe
-
Size
283KB
-
MD5
c801ed2ca1f4f204ca5d28a6ab366949
-
SHA1
781f35df9b44560982623ef0259a05fbf99b8fcc
-
SHA256
c83bb3ba68f3f4fde63abea1a95a89566c4a8b75bac40d47b8733a1dac0d1658
-
SHA512
2d910f09aaeaf0ad6e769f5148ce61f4d284468da1f109434602e2e4c7ddd567d41cd6dae95aba72133dc77fcf35d9814be6c645d05f40d8268ab9036adce45b
-
SSDEEP
6144:7gZiAEAO0sByNsAal3gVAWgS7/OhwjKfqZr:7gZXEAO/BUdG3gVdt7KnfqZr
Malware Config
Extracted
https://pastebin.com/raw/vNcCt60A
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1204 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1204 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1972 wrote to memory of 528 1972 service.exe 28 PID 1972 wrote to memory of 528 1972 service.exe 28 PID 1972 wrote to memory of 528 1972 service.exe 28 PID 1972 wrote to memory of 528 1972 service.exe 28 PID 528 wrote to memory of 1204 528 WScript.exe 29 PID 528 wrote to memory of 1204 528 WScript.exe 29 PID 528 wrote to memory of 1204 528 WScript.exe 29 PID 528 wrote to memory of 1204 528 WScript.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\service.exe"C:\Users\Admin\AppData\Local\Temp\service.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\config.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Unrestricted -nologo -command .\service.ps13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD5a5871da9a2df94e7f9e631b8d88db6f2
SHA10fe4a2d4ee43f0ddd04fdf6fcf18ea157f197b6b
SHA256c3da432bc28fc4cd5346b0b1350217dbc1fb5939dd3436a1a1415d5f5a4c821d
SHA5124c31e60bd2d823eec6f3c83973b0845c104632006877e3960ff3c7abc69b05f41d09a2dcede557d642b5e74a128800dfd543f2f88026a1400172ec4ea850084c
-
Filesize
949B
MD58a97b217587bf21df5b6be29428a1251
SHA133bc1ad54acc40f29d1b09767811c4a9f779f9a5
SHA256ac975c8129b58f138e0f9880d5d63e6ca9e350c875e09a6dd5c16b40eaa9ea0d
SHA512944c4fbbb3e92afad4cb4fc9f675cbe0b12ff3ef371fa1a5acdffb8489d7c7dde6e2cb8c2a1e194db9eba8e7c74db82b91ceaa40bc3f189924adaeae01cc2409