Analysis
-
max time kernel
4294088s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
06-04-2022 18:55
Static task
static1
Behavioral task
behavioral1
Sample
5EC916692459E93949544DB39FDCE71B.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
5EC916692459E93949544DB39FDCE71B.exe
Resource
win10v2004-en-20220113
General
-
Target
5EC916692459E93949544DB39FDCE71B.exe
-
Size
2.3MB
-
MD5
5ec916692459e93949544db39fdce71b
-
SHA1
6b367f296b8d35693dc7b3376c10afc1aa356d1c
-
SHA256
6f1ed485d1206bb2d0a1b5e6246a0a7740dabe66bf79e4ab26f82c74f90b23da
-
SHA512
9e851d67ffc54cf1fb9e2a06988662e082eb76c658dc9928a45f793bddd8ad90e9ddaec211f8334fb0b63e10acede8b38190463126f44affa65660e100bdc6cf
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
5EC916692459E93949544DB39FDCE71B.exepid process 1636 5EC916692459E93949544DB39FDCE71B.exe 1636 5EC916692459E93949544DB39FDCE71B.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD58d5a5529462a9ba1ac068ee0502578c7
SHA1875e651e302ce0bfc8893f341cf19171fee25ea5
SHA256e625dcd0188594b1289891b64debddeb5159aca182b83a12675427b320bf7790
SHA512101da2c33f47bd85b8934318e0f0b72f820afc928a2a21e2c7823875e3a0e830f7c67f42b4c2f30596eaa073617790c89700c0d95b7949ec617e52800b61d462
-
Filesize
4KB
MD5dada3e1836af78d5b24499da252d01e4
SHA1d2a1c25405e3c74973cf18dec2c7138df9e96a83
SHA2560073337816509851476c2cc154f471a3e3a1a2806b97c363870acc09a30a5ed7
SHA512f8bda8413dadb00a644341da5e076f203a3134daaefd2961fa0341f5a533eee28582ce9872354ead698bb1275ee7726fa574267e909a3e2f977908392e7a5c66