Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09/05/2022, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_47399.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice_47399.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
Invoice_47399.exe
-
Size
1.1MB
-
MD5
3d1ab8ea27ac65a81e0f4cf09e5c3dcc
-
SHA1
6fb0d330cd8198b24a7aa241c2937c2798f42f00
-
SHA256
b626826522cb18cec741b324a13d2b59c590b482efa73ecca4e93ec4ebd02405
-
SHA512
894d420cbfcb5c1c9af745409ca36bb4dbb1e9bf4d8a9e344cccaf4d996775607dfb398ba8c846764e274c78cc9ebd2f7c2ca6e4fe7bedcd9f345a2a9bec4453
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4840 Invoice_47399.exe 4840 Invoice_47399.exe 4840 Invoice_47399.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4840 wrote to memory of 4632 4840 Invoice_47399.exe 83 PID 4840 wrote to memory of 4632 4840 Invoice_47399.exe 83 PID 4840 wrote to memory of 4632 4840 Invoice_47399.exe 83