Analysis
-
max time kernel
36s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12/07/2022, 06:06
Static task
static1
Behavioral task
behavioral1
Sample
4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe
Resource
win10v2004-20220414-en
General
-
Target
4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe
-
Size
3.3MB
-
MD5
1e5f31698185dea0d7a4a97b985b1114
-
SHA1
e32a470e099d433abaac3f61c096b9d3e0efcef6
-
SHA256
4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018
-
SHA512
f64dfb4c6f1acb2ff7318c2b16f026c8fdd67a05f450356c979c795c0fa86272b5b292944ba18eefc57c5ece52422f03e076d58d56b27d59c539c9ff114b2815
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\G: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\R: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\F: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\H: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\K: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\Q: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\U: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\V: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\W: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\I: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\J: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\L: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\O: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\M: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\N: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\P: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\S: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\T: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\X: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\Y: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe File opened (read-only) \??\Z: 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 896 4c75f7de452cf66eddd2bd2313419f95b43704677b1b9ab21b809e80b38fd018.exe