Analysis Overview
SHA256
214ea9347df948e515af3f0ed446722e36f011e8cd34a221eb6e506269b955f3
Threat Level: Known bad
The file 214ea9347df948e515af3f0ed446722e36f011e8cd34a221eb6e506269b955f3.bin.sample was found to be: Known bad.
Malicious Activity Summary
Blackcat family
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2022-07-27 12:25
Signatures
Blackcat family
Analysis: behavioral1
Detonation Overview
Submitted
2022-07-27 12:25
Reported
2022-07-27 12:30
Platform
win10-20220414-en
Max time kernel
52s
Max time network
180s
Command Line
Signatures
Processes
C:\Users\Admin\AppData\Local\Temp\214ea9347df948e515af3f0ed446722e36f011e8cd34a221eb6e506269b955f3.bin.exe
"C:\Users\Admin\AppData\Local\Temp\214ea9347df948e515af3f0ed446722e36f011e8cd34a221eb6e506269b955f3.bin.exe"
Network
Files
memory/1312-115-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-116-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-117-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-118-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-119-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-120-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-121-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-122-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-123-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-124-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-125-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-126-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-127-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-128-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-129-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-130-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-131-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-132-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-133-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-134-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-135-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-136-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-137-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-138-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-139-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-141-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-142-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-143-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-144-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-145-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-140-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-146-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-147-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-148-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-149-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-150-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-151-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-152-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-153-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-154-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-155-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-156-0x0000000077050000-0x00000000771DE000-memory.dmp
memory/1312-157-0x0000000077050000-0x00000000771DE000-memory.dmp