Analysis

  • max time kernel
    39s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    13/06/2022, 03:43

General

  • Target

    SecuriteInfo.com.Variant.Ursu.260719.16071.exe

  • Size

    1.5MB

  • MD5

    d0204cc69e7bf379bbc9868d94ae085d

  • SHA1

    4c6943bff78b4022b520cfa75d6a11f899c95043

  • SHA256

    fbdd46a7930759969f012483ed58f7d1dd23710e0722876fc32090b6f21c36a4

  • SHA512

    e599a7f5d7159c11276381ab52ad6f8b36d959ba697a6ef10cc1736237481b478a1432dd48776b6c345dbaed64b2ed8cf381cc9edf573a2afa02b30c0b853a04

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Ursu.260719.16071.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Ursu.260719.16071.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c C:\Users\Admin\AppData\Local\Temp\
      2⤵
        PID:1548

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1464-56-0x0000000075381000-0x0000000075383000-memory.dmp

      Filesize

      8KB