Resubmissions

05/06/2022, 15:10 UTC

220605-sj6zqabfd5 8

02/06/2022, 19:49 UTC

220602-yjvvcabad9 10

Analysis

  • max time kernel
    76s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    02/06/2022, 19:49 UTC

General

  • Target

    Document-1310.iso

  • Size

    338KB

  • MD5

    ba10e6e571578304126a889202571e1b

  • SHA1

    4a5d5a50503bc96e50b103981f05373982ecf307

  • SHA256

    692ad829cb6c9788998acb106ea4d8311e432c866d082ac3cc117166ac50080d

  • SHA512

    aa0971e9169786e65407aae13a05b23710abda00c23d5103434ac655183670248a19736153c2528661f6dd7fcf46bc03df2c9264b84e24464aaa7ad916f6c40b

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Document-1310.iso
    1⤵
    • Modifies registry class
    • Suspicious behavior: LoadsDriver
    PID:3632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.