Analysis

  • max time kernel
    35s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06/06/2022, 16:34

General

  • Target

    SecuriteInfo.com.Variant.Tedy.136216.12172.exe

  • Size

    1.4MB

  • MD5

    8c17d000e5c2c8f7c4ac93dcbf8555ad

  • SHA1

    423145d272a89dcc625be3f3d57df00d7481f569

  • SHA256

    be5dca1c90e3ca0f7554a3c49d8588d182832e702b987dd323f5f3fdb5fcd990

  • SHA512

    9bbdb934e506a6407c5c44df78458ec0e9c1f58edfbf6882dca3643b653a38bc649dd2f9c5f5afc51be04a45c2f9add64fa90a7e4e95ccfc976208747b4e9d58

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Tedy.136216.12172.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Tedy.136216.12172.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1972
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
      2⤵
        PID:1436

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1972-56-0x0000000075F21000-0x0000000075F23000-memory.dmp

      Filesize

      8KB