Analysis

  • max time kernel
    8s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    15-03-2021 09:51

General

  • Target

    2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951(1).exe

  • Size

    120KB

  • MD5

    a487bae084bbd75ecbdc5d9fede362ba

  • SHA1

    6342522e5fd28c6a40cb4443c0300ee16caaa504

  • SHA256

    2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951

  • SHA512

    bb6905072339b8c7f94b1a9edf825678f1a279b5968a68728d764c546f363d2059c3e819f15968c1c68aa4ab33ac36021e155443f785806050bfc71c65d68873

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951(1).exe
    "C:\Users\Admin\AppData\Local\Temp\2df6c36b4784f4934afabe081335830ee9c00520070582b5a381335b4350f951(1).exe"
    1⤵
    • Loads dropped DLL
    PID:336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/336-2-0x00000000753E1000-0x00000000753E3000-memory.dmp

    Filesize

    8KB