Analysis
-
max time kernel
7s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 13:46
Static task
static1
Behavioral task
behavioral1
Sample
345ac596f12617871bbf4c0584e578c7606451bfa270383ab90f6d57b4d82672.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
345ac596f12617871bbf4c0584e578c7606451bfa270383ab90f6d57b4d82672.exe
Resource
win10v2004-20220414-en
General
-
Target
345ac596f12617871bbf4c0584e578c7606451bfa270383ab90f6d57b4d82672.exe
-
Size
118KB
-
MD5
58386adaea3b5e737144388e6607d8a5
-
SHA1
951c5d44f30ecb219117c3e5691b417d1bdba397
-
SHA256
345ac596f12617871bbf4c0584e578c7606451bfa270383ab90f6d57b4d82672
-
SHA512
8d6417cf5243f1d22ff17164f90055925e7de11d39f194723749d50f0e97810ab33d48356c571a681546e577750c1bd13781848d0f24c1c8a01e9c7560b7788e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
-
C:\Users\Admin\AppData\Local\Temp\345ac596f12617871bbf4c0584e578c7606451bfa270383ab90f6d57b4d82672.exe"C:\Users\Admin\AppData\Local\Temp\345ac596f12617871bbf4c0584e578c7606451bfa270383ab90f6d57b4d82672.exe"1⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\fakerror.exe"C:\Users\Admin\AppData\Local\Temp\fakerror.exe"2⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\injector(automatic).exe"C:\Users\Admin\AppData\Local\Temp\injector(automatic).exe"2⤵PID:4372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\fakerror.exeFilesize
7KB
MD53f4bc3d0287d911603691767c5d372fa
SHA104dcd270b7ed88185d2374ca0f825adbd058a51c
SHA256c07e16bba6f09bead939ed6e38f23a55de6515558679a8bb8f722ef4edbb1909
SHA512f560a7e3e4c0931ca45237d85f65a711a5033ffb2b825145013c7b9289b0010e0f0f4cdc4f77882d565f1e97ea9825c9d4aebfa55fb7b44624a8ef7e9134a797
-
C:\Users\Admin\AppData\Local\Temp\fakerror.exeFilesize
7KB
MD53f4bc3d0287d911603691767c5d372fa
SHA104dcd270b7ed88185d2374ca0f825adbd058a51c
SHA256c07e16bba6f09bead939ed6e38f23a55de6515558679a8bb8f722ef4edbb1909
SHA512f560a7e3e4c0931ca45237d85f65a711a5033ffb2b825145013c7b9289b0010e0f0f4cdc4f77882d565f1e97ea9825c9d4aebfa55fb7b44624a8ef7e9134a797
-
C:\Users\Admin\AppData\Local\Temp\injector(automatic).exeFilesize
50KB
MD54289aac728fc2b0e70b11545aa54cd1d
SHA19b1aea2c3197bbe75e69220489ee68e8cbeebe80
SHA256a57c5f01459bb64ab46bd17da672b99d0ec2bab7e0442aeae76aa56a08e0b53c
SHA5121bb9d613f6787081311a96bbc110c8d59b450822f15fef1e25623b8112c9d681714aaa0a2fd31dd339d3b7f3c3e6c707426b81a030fc8cff37dbaabf5c01cb0c
-
C:\Users\Admin\AppData\Local\Temp\injector(automatic).exeFilesize
35KB
MD5ac99e04ec13a27c1a26a8b6e95edb353
SHA13dcd396444b78dd458cdd352fa6b5a14e6c2530f
SHA256898e680322df151c3b38ec653c5eef6c7509f472d7a0ea9d1ee5a7aa90e47c2c
SHA512aa24ae87aca8541d03223fdb721ca99c5b4fe78632711f71cbfbb20d873b617f32d6c19c276e081ed17b8ff3d30c105df351bb804615b13235b22706a39a1be2
-
memory/4372-140-0x00007FFEFD280000-0x00007FFEFDD41000-memory.dmpFilesize
10.8MB
-
memory/4372-142-0x00000151A8710000-0x00000151A871A000-memory.dmpFilesize
40KB
-
memory/4372-136-0x00000151A8340000-0x00000151A8360000-memory.dmpFilesize
128KB
-
memory/4372-133-0x0000000000000000-mapping.dmp
-
memory/4604-137-0x0000000000F10000-0x0000000000F18000-memory.dmpFilesize
32KB
-
memory/4604-139-0x0000000005780000-0x0000000005812000-memory.dmpFilesize
584KB
-
memory/4604-138-0x0000000005C30000-0x00000000061D4000-memory.dmpFilesize
5.6MB
-
memory/4604-141-0x0000000005830000-0x000000000583A000-memory.dmpFilesize
40KB
-
memory/4604-130-0x0000000000000000-mapping.dmp