Analysis
-
max time kernel
50s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14/04/2023, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
ningen.jpg
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
ningen.jpg
Resource
win10v2004-20230220-en
1 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
ningen.jpg
-
Size
4KB
-
MD5
eaa52fe4b08514bebe4785229911a0be
-
SHA1
cb79e1a60c2257d73d7fa33aaca7a48934c73a44
-
SHA256
408940d35fd05dae82654e6034cca770ed07d6bf9078c0408c3167186ea7d564
-
SHA512
45d66b32fdc9162129f80cababcef5b4dfca02667066a771dc584094d5f20fd1af9491f6781df433a40a2a98ffd346a92d35780d356c2be48b0b2e8a34c0bc14
-
SSDEEP
96:UDgJ3y80/R6+GHH0KZf++0CbzI7z4v5F6l1612k/PUDcxagH6TfSrFnvCt:EmS5Gn0w++pCzWm16Nec51Ct
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 392 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 392 AUDIODG.EXE Token: 33 392 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 392 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1768 rundll32.exe 1768 rundll32.exe
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\ningen.jpg1⤵
- Suspicious use of FindShellTrayWindow
PID:1768
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:268
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5601⤵
- Suspicious use of AdjustPrivilegeToken
PID:392
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:700