Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14/09/2022, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
PROCEED TO RELEASE UNDELIVERED EMAILS.scr
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PROCEED TO RELEASE UNDELIVERED EMAILS.scr
Resource
win10v2004-20220812-en
General
-
Target
PROCEED TO RELEASE UNDELIVERED EMAILS.scr
-
Size
148KB
-
MD5
2fceab95cbfb9b6e58d30350acd5b616
-
SHA1
3c97dbb41a7f064ddd9ed699464906e6e372be16
-
SHA256
e285046c02d47b8c6afc3e904a654e2178d6713ac35d3e261d5574108c7d8a98
-
SHA512
433eec9c47c7c1ec5c68c19beeda43a74b9feaf314262e1d2fe552191ef99d4d5ef07f851ec61601391c989077c3eed3e0b603145066004414a8984bc8a375d7
-
SSDEEP
3072:CIlLpNjldDfiLucCMuaSLeRyb8L+7tw+fl1XUdCstZFk2jMRZ2:CspNjlsAeRs6CHrUdCstZFk2jY2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1380 PROCEED TO RELEASE UNDELIVERED EMAILS.scr -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Softwarepakkers.lnk PROCEED TO RELEASE UNDELIVERED EMAILS.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD517ed1c86bd67e78ade4712be48a7d2bd
SHA11cc9fe86d6d6030b4dae45ecddce5907991c01a0
SHA256bd046e6497b304e4ea4ab102cab2b1f94ce09bde0eebba4c59942a732679e4eb
SHA5120cbed521e7d6d1f85977b3f7d3ca7ac34e1b5495b69fd8c7bfa1a846baf53b0ecd06fe1ad02a3599082ffacaf8c71a3bb4e32dec05f8e24859d736b828092cd5