Analysis
-
max time kernel
160s -
max time network
172s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21/01/2022, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
6c85c0c30888891e6acc548af91139955b0c669181d7c2b8eaf1dd40dd3293dc.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6c85c0c30888891e6acc548af91139955b0c669181d7c2b8eaf1dd40dd3293dc.exe
Resource
win10-en-20211208
General
-
Target
6c85c0c30888891e6acc548af91139955b0c669181d7c2b8eaf1dd40dd3293dc.exe
-
Size
9.5MB
-
MD5
afb66f6c58f71bd34ee52b0f4f4773f8
-
SHA1
6e8b530b23c4dcb28af05174909c1d8617d0e5f5
-
SHA256
6c85c0c30888891e6acc548af91139955b0c669181d7c2b8eaf1dd40dd3293dc
-
SHA512
6881d3cf632951feaf5862ff3c765dddc97c611bf05402e60b23187abf9c8f2d1a88286b18619c53c4e2fe5997d98d19bf0fea977e9d0b036a0c9cbde631f451
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1924 DllHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c85c0c30888891e6acc548af91139955b0c669181d7c2b8eaf1dd40dd3293dc.exe"C:\Users\Admin\AppData\Local\Temp\6c85c0c30888891e6acc548af91139955b0c669181d7c2b8eaf1dd40dd3293dc.exe"1⤵PID:832
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:1924