Analysis
-
max time kernel
3s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
15-05-2021 14:41
Static task
static1
Behavioral task
behavioral1
Sample
7c34b806afb3ae478c837acdecbc0f5709dad6a17620402b6a7b14d9e2428bbb.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
7c34b806afb3ae478c837acdecbc0f5709dad6a17620402b6a7b14d9e2428bbb.exe
Resource
win10v20210410
General
-
Target
7c34b806afb3ae478c837acdecbc0f5709dad6a17620402b6a7b14d9e2428bbb.exe
-
Size
1.5MB
-
MD5
59058b82e0c8ca6d3801f38036119f5b
-
SHA1
a0face8c6f0d62327ae1d096b0949b5d0bb140fc
-
SHA256
7c34b806afb3ae478c837acdecbc0f5709dad6a17620402b6a7b14d9e2428bbb
-
SHA512
ae295166d938586fe378fa864bf06dd1cc3e521c173610b7dcf05146f47ddf30402224b721aa2aa58b236b8b6bdbfd8789a402360e4216a5b4254804915d2153
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1420 7c34b806afb3ae478c837acdecbc0f5709dad6a17620402b6a7b14d9e2428bbb.exe