Analysis
-
max time kernel
882s -
max time network
884s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2023 00:53
Static task
static1
Behavioral task
behavioral1
Sample
A2-Cryptor.cmd
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
A2-Cryptor.cmd
Resource
win10v2004-20230220-en
General
-
Target
A2-Cryptor.cmd
-
Size
32KB
-
MD5
e031c713842d1db79d96101f8c0cf523
-
SHA1
f97ce721472dd931998b272eeeec4e31cfedbfa5
-
SHA256
30c4ed4509726173dfbb176a35e6cbc70b97cc7cad46c615e8bf89ad653b9ce6
-
SHA512
a97a688c0663d2937377eb379da4e5cbdea9b28d09611a634b66cfb251091890722d160b44154fe073c4a5eb89b5dee27f06e17b0b3aea96b2bab8ef03d5360e
-
SSDEEP
768:5yZE+8xnU25JWrmk2g9Ta1wCvKinXKCuY:5tU25J+a1hvhaCP
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 3 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\A: cmd.exe File opened (read-only) \??\B: cmd.exe -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\18769_25985.jpeg" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\18769_25985.jpeg" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\18769_25985.jpeg" wscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 5 IoCs
pid Process 1876 timeout.exe 1484 timeout.exe 1472 timeout.exe 1684 timeout.exe 320 timeout.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop wscript.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop wscript.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Control Panel\Desktop wscript.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2040 wrote to memory of 976 2040 cmd.exe 29 PID 2040 wrote to memory of 976 2040 cmd.exe 29 PID 2040 wrote to memory of 976 2040 cmd.exe 29 PID 2040 wrote to memory of 1684 2040 cmd.exe 30 PID 2040 wrote to memory of 1684 2040 cmd.exe 30 PID 2040 wrote to memory of 1684 2040 cmd.exe 30 PID 2040 wrote to memory of 320 2040 cmd.exe 31 PID 2040 wrote to memory of 320 2040 cmd.exe 31 PID 2040 wrote to memory of 320 2040 cmd.exe 31 PID 2040 wrote to memory of 1876 2040 cmd.exe 32 PID 2040 wrote to memory of 1876 2040 cmd.exe 32 PID 2040 wrote to memory of 1876 2040 cmd.exe 32 PID 2040 wrote to memory of 1484 2040 cmd.exe 33 PID 2040 wrote to memory of 1484 2040 cmd.exe 33 PID 2040 wrote to memory of 1484 2040 cmd.exe 33 PID 2040 wrote to memory of 1992 2040 cmd.exe 34 PID 2040 wrote to memory of 1992 2040 cmd.exe 34 PID 2040 wrote to memory of 1992 2040 cmd.exe 34 PID 2040 wrote to memory of 540 2040 cmd.exe 35 PID 2040 wrote to memory of 540 2040 cmd.exe 35 PID 2040 wrote to memory of 540 2040 cmd.exe 35 PID 2040 wrote to memory of 684 2040 cmd.exe 37 PID 2040 wrote to memory of 684 2040 cmd.exe 37 PID 2040 wrote to memory of 684 2040 cmd.exe 37 PID 2040 wrote to memory of 1472 2040 cmd.exe 36 PID 2040 wrote to memory of 1472 2040 cmd.exe 36 PID 2040 wrote to memory of 1472 2040 cmd.exe 36 PID 540 wrote to memory of 840 540 wscript.exe 38 PID 540 wrote to memory of 840 540 wscript.exe 38 PID 540 wrote to memory of 840 540 wscript.exe 38 PID 684 wrote to memory of 396 684 wscript.exe 39 PID 684 wrote to memory of 396 684 wscript.exe 39 PID 684 wrote to memory of 396 684 wscript.exe 39 PID 1992 wrote to memory of 1724 1992 wscript.exe 40 PID 1992 wrote to memory of 1724 1992 wscript.exe 40 PID 1992 wrote to memory of 1724 1992 wscript.exe 40 PID 2040 wrote to memory of 1564 2040 cmd.exe 41 PID 2040 wrote to memory of 1564 2040 cmd.exe 41 PID 2040 wrote to memory of 1564 2040 cmd.exe 41
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\A2-Cryptor.cmd"1⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\certutil.execertutil -decode "Image.bin" "18769_25985.jpeg"2⤵PID:976
-
-
C:\Windows\system32\timeout.exetimeout /t 22⤵
- Delays execution with timeout.exe
PID:1684
-
-
C:\Windows\system32\timeout.exetimeout /t 22⤵
- Delays execution with timeout.exe
PID:320
-
-
C:\Windows\system32\timeout.exetimeout /t 22⤵
- Delays execution with timeout.exe
PID:1876
-
-
C:\Windows\system32\timeout.exetimeout /t 42⤵
- Delays execution with timeout.exe
PID:1484
-
-
C:\Windows\system32\wscript.exewscript "0.vbs"2⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\RUNDLL32.EXE"C:\Windows\System32\RUNDLL32.EXE" user32.dll, UpdatePerUserSystemParameters3⤵PID:1724
-
-
-
C:\Windows\system32\wscript.exewscript "0.vbs"2⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\System32\RUNDLL32.EXE"C:\Windows\System32\RUNDLL32.EXE" user32.dll, UpdatePerUserSystemParameters3⤵PID:840
-
-
-
C:\Windows\system32\timeout.exetimeout /t 32⤵
- Delays execution with timeout.exe
PID:1472
-
-
C:\Windows\system32\wscript.exewscript "0.vbs"2⤵
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\System32\RUNDLL32.EXE"C:\Windows\System32\RUNDLL32.EXE" user32.dll, UpdatePerUserSystemParameters3⤵PID:396
-
-
-
C:\Windows\system32\mode.comMODE CON: COLS=100 LINES=252⤵PID:1564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385B
MD5cd7ed110bcef703245c88c8436792832
SHA15780714df40dbda0a3372cb3ed968e18d852aa03
SHA256eaba70d2be7fc6376bbf81ff4eba4ebb1861e951f24ef35b15ce213718d9ee32
SHA512eeab9499c8e8802678433a7ad083718f7807b62475483ddefcc43be78f7332d0f2514795bb6dcc995a7dd6d417561be42011f2bed6ec3c110422865e0747b01a
-
Filesize
15KB
MD520aba01130e85571476712c784af05b0
SHA154c9002381bafbfa648dd3f5c77b1830efc1dc85
SHA25672bdac2468fa4e19f8915817f380ceeb96ff94a64a3e29e64ac79b65bed2f6ac
SHA512c84a603b359d3e7097229161d22a69c574a582cbbd21c8343fa06986b5058125763196b8d4e2f7bf51400ffaba63e9c565e42c32759b973439f46e5a9f84b19f
-
Filesize
21KB
MD5f6f72da7cd731682ff5442ba541457e2
SHA160bddfc609fad2f80c0688905e795e51003d9433
SHA25600a5048d9f74271e4cd5c36cf1434c789a8c16206ff5fca1c785156e01693bc1
SHA5122a09df3df3d89ec413f31f7a20254513db6323e7c7e5e041161f55dfefcc80d22870c512f71aad77e7e9ef775b635a707ddf60b0bb4ef458bff6e15f1e425e5d