Analysis
-
max time kernel
12s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-04-2021 06:48
Static task
static1
Behavioral task
behavioral1
Sample
Absa.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Absa.exe
Resource
win10v20210410
General
-
Target
Absa.exe
-
Size
1.1MB
-
MD5
543b483edf1e71d19b7e2ca64ce9e2d9
-
SHA1
9c91f6bf2f7d23f288119d95999e107308151f8a
-
SHA256
71bb1f2e0a1aecf13985a354d05fb522c85746e08a01a858a4473237a96e85fd
-
SHA512
b0f2111e1a7c6977548b983cfb1abc92b9d2690d04d7c85ef0cde35b869fcac9666163821212088dc90a5afb1c533adf69d7bbc53939caea6996a6187a9006a7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
wlxuupkxco.pifpid process 2180 wlxuupkxco.pif -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Absa.exedescription pid process target process PID 2204 wrote to memory of 2180 2204 Absa.exe wlxuupkxco.pif PID 2204 wrote to memory of 2180 2204 Absa.exe wlxuupkxco.pif PID 2204 wrote to memory of 2180 2204 Absa.exe wlxuupkxco.pif
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8697c9cc411d42f598243797c53bae95
SHA1efa1efb4b5e463d42d6f496883297b7a47c23796
SHA256be731b853d1752b83706346f2256d4f2d9e39207f066a0c6876044229b784a8d
SHA5127982891c8dd3b41e2466f183377f6533981f7d3807eb40105ca996ad080420250fde54ab0710c8cc1adf7a453cc769683e0dff93b825fb7d486cd8bf739c784a