Analysis

  • max time kernel
    76s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2022 15:21

General

  • Target

    bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe

  • Size

    228KB

  • MD5

    f8995083b10322509f7a338aa39d56fc

  • SHA1

    4ac8cb20f3cce570ed371719009899133b7e79c7

  • SHA256

    bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350

  • SHA512

    d6bee3ad16443b1fe97c6059462750345de891a060a343b3ef299ce1f0ae54a73a46d279f8b0725fd300eac8ca689006a0319b77c6dcd4f2c1e96f3f5e482fb9

  • SSDEEP

    3072:2Sm5IMCDwYIZeenqa91ffj+dHZhW2zL4qL0BUiYAWnuvVjVcSqRvTlbG:2Sm5wwYIZe+fHinPzL4qgvYA7RVcSwRG

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe
    "C:\Users\Admin\AppData\Local\Temp\bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe"
    1⤵
    • Adds Run key to start application
    PID:3496

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads