Analysis
-
max time kernel
37s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
19-04-2023 17:35
Behavioral task
behavioral1
Sample
4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7.elf
Resource
win7-20230220-en
4 signatures
150 seconds
General
-
Target
4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7.elf
-
Size
132KB
-
MD5
59ce0baba11893f90527fc951ac69912
-
SHA1
5857a7dd621c4c3ebb0b5a3bec915d409f70d39f
-
SHA256
4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7
-
SHA512
c5b12797b477e5e5964a78766bb40b1c0d9fdfb8eef1f9aee3df451e3441a40c61d325bf400ba51048811b68e1c70a95f15e4166b7a65a4eca0c624864328647
-
SSDEEP
3072:phNlHuBafLeBtfCzpta8xlBIOdVo3/4sxLJ10xioP:p3lOYoaja8xzx/0wsxzSi2
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1472 AcroRd32.exe 1472 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 832 wrote to memory of 764 832 cmd.exe 29 PID 832 wrote to memory of 764 832 cmd.exe 29 PID 832 wrote to memory of 764 832 cmd.exe 29 PID 764 wrote to memory of 1472 764 rundll32.exe 30 PID 764 wrote to memory of 1472 764 rundll32.exe 30 PID 764 wrote to memory of 1472 764 rundll32.exe 30 PID 764 wrote to memory of 1472 764 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7.elf1⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7.elf2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\4293c1d8574dc87c58360d6bac3daa182f64f7785c9d41da5e0741d2b1817fc7.elf"3⤵
- Suspicious use of SetWindowsHookEx
PID:1472
-
-