Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
09/05/2022, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
unpack.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
unpack.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
unpack.exe
-
Size
1.2MB
-
MD5
592cca2bd60c3098d7a2e562e994b6fb
-
SHA1
c3ecc78bbb9098f52007bfb527dc3cef975cc36e
-
SHA256
a670c683bfd2a0dc75a9b5fba8f491ec4126b1f0908a469687664a9023ad8b19
-
SHA512
cf0fcabf26fd40a3e0c705fc5f8dc343082f3c0a9de459ece3b59eab86dabfad1384fadb4478c903808f49e734135268f25a25a773a694e07c57a9b056f86470
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1552 unpack.exe 1552 unpack.exe 1552 unpack.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1748 1552 unpack.exe 28 PID 1552 wrote to memory of 1748 1552 unpack.exe 28 PID 1552 wrote to memory of 1748 1552 unpack.exe 28 PID 1552 wrote to memory of 1748 1552 unpack.exe 28