Analysis
-
max time kernel
76s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2022 15:21
Static task
static1
Behavioral task
behavioral1
Sample
bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe
Resource
win10v2004-20220901-en
General
-
Target
bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe
-
Size
228KB
-
MD5
f8995083b10322509f7a338aa39d56fc
-
SHA1
4ac8cb20f3cce570ed371719009899133b7e79c7
-
SHA256
bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350
-
SHA512
d6bee3ad16443b1fe97c6059462750345de891a060a343b3ef299ce1f0ae54a73a46d279f8b0725fd300eac8ca689006a0319b77c6dcd4f2c1e96f3f5e482fb9
-
SSDEEP
3072:2Sm5IMCDwYIZeenqa91ffj+dHZhW2zL4qL0BUiYAWnuvVjVcSqRvTlbG:2Sm5wwYIZe+fHinPzL4qgvYA7RVcSwRG
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe" bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run bdcf629b93ed4d65f3375c9ae54717b1f3045d4367c6df7cc1ede9d908634350.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.