Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09/05/2022, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
unpack.exe
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
unpack.exe
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
unpack.exe
-
Size
1.2MB
-
MD5
592cca2bd60c3098d7a2e562e994b6fb
-
SHA1
c3ecc78bbb9098f52007bfb527dc3cef975cc36e
-
SHA256
a670c683bfd2a0dc75a9b5fba8f491ec4126b1f0908a469687664a9023ad8b19
-
SHA512
cf0fcabf26fd40a3e0c705fc5f8dc343082f3c0a9de459ece3b59eab86dabfad1384fadb4478c903808f49e734135268f25a25a773a694e07c57a9b056f86470
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1944 unpack.exe 1944 unpack.exe 1944 unpack.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 3372 1944 unpack.exe 83 PID 1944 wrote to memory of 3372 1944 unpack.exe 83 PID 1944 wrote to memory of 3372 1944 unpack.exe 83