Analysis
-
max time kernel
41s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 15:21
Static task
static1
Behavioral task
behavioral1
Sample
cab84f4a102b4dc9a847b6d0539e6c3b231c8a11a15df636a8ebc2a6eab18627.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cab84f4a102b4dc9a847b6d0539e6c3b231c8a11a15df636a8ebc2a6eab18627.exe
Resource
win10v2004-20220812-en
General
-
Target
cab84f4a102b4dc9a847b6d0539e6c3b231c8a11a15df636a8ebc2a6eab18627.exe
-
Size
228KB
-
MD5
72bab85f314af2737ed14ce80027a2ee
-
SHA1
a5b1f8f107b56d73b0e5a2ee24181a04ef3b1bac
-
SHA256
cab84f4a102b4dc9a847b6d0539e6c3b231c8a11a15df636a8ebc2a6eab18627
-
SHA512
68aaa6d9eaf44658973c4ddc1b4dba54024d9ae9c9861418c2742f0dc9a44ade53d52ff78a49995b4514f6786afa27c42b5c03daf3ce9829656a39cdbe7a2565
-
SSDEEP
3072:2Sm5IMCDwYIZeenqa91ffj+dHZhW2zL4qL0BUiYAWnuvVjVcSqRvTlbJ:2Sm5wwYIZe+fHinPzL4qgvYA7RVcSwRJ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cab84f4a102b4dc9a847b6d0539e6c3b231c8a11a15df636a8ebc2a6eab18627.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cab84f4a102b4dc9a847b6d0539e6c3b231c8a11a15df636a8ebc2a6eab18627.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\cab84f4a102b4dc9a847b6d0539e6c3b231c8a11a15df636a8ebc2a6eab18627.exe" cab84f4a102b4dc9a847b6d0539e6c3b231c8a11a15df636a8ebc2a6eab18627.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.