Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
26-09-2021 20:15
Static task
static1
Behavioral task
behavioral1
Sample
ae4880c5a68803603035f104e8adaea661841411738bd571341a4a3458a2fa9f.exe
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
ae4880c5a68803603035f104e8adaea661841411738bd571341a4a3458a2fa9f.exe
-
Size
533KB
-
MD5
c2c43964cea610bcde9a71a9f83072ff
-
SHA1
bf3f54e6878bf2a5d96db2f90e0c4661b144fea0
-
SHA256
ae4880c5a68803603035f104e8adaea661841411738bd571341a4a3458a2fa9f
-
SHA512
15e599538ab2775a0296654d3487db7391871e0e2c153edfa34b436452c11cc22fb095e672f17106d31217671cc076e5db51e90caf12c5a100de68ba7ab91411
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ae4880c5a68803603035f104e8adaea661841411738bd571341a4a3458a2fa9f.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ae4880c5a68803603035f104e8adaea661841411738bd571341a4a3458a2fa9f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ae4880c5a68803603035f104e8adaea661841411738bd571341a4a3458a2fa9f.exe