Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14-09-2022 09:11
Static task
static1
Behavioral task
behavioral1
Sample
invoice.img
Resource
win7-20220812-en
2 signatures
150 seconds
General
-
Target
invoice.img
-
Size
3.8MB
-
MD5
7cb4f9414c3012a937437509e0b67478
-
SHA1
1b14a60cfad25c27191a4630e08b55a63c1ad86e
-
SHA256
091bd738da3c006d6a2484b7f98702bd9de63780d53c8af99f7a4c57ac05869e
-
SHA512
aeaeb3db36dcfdf651658e91dcde226127adef433272d4b16b1bf2cf10f066baf2c94cf8bcf248fb6c6d53a2a97179cedd1959a42ece7d2c1beb99bae1d5c5c9
-
SSDEEP
98304:EHRol0dMODe4hTMJdbmzT82KK+6nkRq9qczLSS:EHRo0Mui6f82KYkReFT
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1096 wrote to memory of 956 1096 cmd.exe 29 PID 1096 wrote to memory of 956 1096 cmd.exe 29 PID 1096 wrote to memory of 956 1096 cmd.exe 29