Analysis
-
max time kernel
92s -
max time network
76s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
16/04/2023, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
data.ini
Resource
win7-20230220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
data.ini
Resource
win10v2004-20230220-en
1 signatures
150 seconds
General
-
Target
data.ini
-
Size
144B
-
MD5
1dacb4177f8c2f92704bc2a304a24519
-
SHA1
37a09398866876766517c928f126abedbc641b7a
-
SHA256
2a4d421aabbd6f4e57ec64da00e9d497fc482b154a131da40dac523be5319515
-
SHA512
c927fee8c108f4e61c2e39c5ec8b5acbc1e296ef2f075769c5c2ac823dda98bcec35aba141510191ebcd46e233946032468c04b4dce4335ae29eaac2901f7947
Score
1/10
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2000 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1168 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1168 AUDIODG.EXE Token: 33 1168 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1168 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2000 NOTEPAD.EXE
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\data.ini1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:2000
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1960
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x56c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1168