Analysis
-
max time kernel
1783s -
max time network
1800s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-06-2022 16:41
Static task
static1
Behavioral task
behavioral1
Sample
91ef42b0f28693e070c042894f5a6283ad8d4441f66599f59e5e9561ab988371.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
91ef42b0f28693e070c042894f5a6283ad8d4441f66599f59e5e9561ab988371.exe
Resource
win10v2004-20220414-en
General
-
Target
91ef42b0f28693e070c042894f5a6283ad8d4441f66599f59e5e9561ab988371.exe
-
Size
169KB
-
MD5
020bb86c656898af5324939f708becb7
-
SHA1
8b0211be15a138bc201a839f9255a0ff927055e3
-
SHA256
91ef42b0f28693e070c042894f5a6283ad8d4441f66599f59e5e9561ab988371
-
SHA512
cbff17a7adbd1434ae482016bab1d8c99f5b9f6d7ab89644a480f73ca8cc2224d12ef5b4a98e7dcdfa40303e40bb2a9f976ebe3e7f0754a0884a84f6dd80e0c9
Malware Config
Signatures
-
Locky
Ransomware strain released in 2016, with advanced features like anti-analysis.
-
suricata: ET MALWARE Ransomware Locky CnC Beacon
suricata: ET MALWARE Ransomware Locky CnC Beacon
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
91ef42b0f28693e070c042894f5a6283ad8d4441f66599f59e5e9561ab988371.exepid process 1044 91ef42b0f28693e070c042894f5a6283ad8d4441f66599f59e5e9561ab988371.exe