Analysis

  • max time kernel
    4294182s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220223-en
  • submitted
    01-03-2022 18:14

General

  • Target

    f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe

  • Size

    712KB

  • MD5

    b2c32c4ca386f1852032ad793d092f6e

  • SHA1

    af22336c22d57eb7cea732f447cad7d2ecb37c2c

  • SHA256

    f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58

  • SHA512

    df8e838da56136351a2e03db23aef2debd984d55cedc26c99570ad35c61293aa7c2918743afd86433d6d5bacd758127a2735a1dbbd3d1dabb2351a00670761f0

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe
    "C:\Users\Admin\AppData\Local\Temp\f3680fe4c64d0581dc68bc1116798864dd9e361d7d50729e2d89844a58d1cd58.exe"
    1⤵
    • Drops startup file
    PID:1932

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1932-54-0x00000000759B1000-0x00000000759B3000-memory.dmp
    Filesize

    8KB

  • memory/1932-55-0x00000000009E0000-0x00000000009E1000-memory.dmp
    Filesize

    4KB