Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-05-2022 13:50
Static task
static1
Behavioral task
behavioral1
Sample
038d193463fc5a9d70c3a58def893bfa586331bf93fbca411b26fd034d1f7ffb.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
038d193463fc5a9d70c3a58def893bfa586331bf93fbca411b26fd034d1f7ffb.exe
Resource
win10v2004-20220414-en
General
-
Target
038d193463fc5a9d70c3a58def893bfa586331bf93fbca411b26fd034d1f7ffb.exe
-
Size
210KB
-
MD5
7ce775122242f916ce850a1682318374
-
SHA1
44d8b76bd320d6dd43fccc2c8b4ea40dcc0f40c2
-
SHA256
038d193463fc5a9d70c3a58def893bfa586331bf93fbca411b26fd034d1f7ffb
-
SHA512
b3ab97bf74e455626fdbb01dd4be14a47fd94fb3b3121edac4c686dfebd88b2786cc55d9bc15ae533b2b3914728cd6cfa46b40bd786d84ead8797cf9de351d72
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/548-54-0x0000000075D21000-0x0000000075D23000-memory.dmpFilesize
8KB