Analysis
-
max time kernel
54s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-09-2022 18:36
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Document BL,INV and packing list.jpg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Shipment Document BL,INV and packing list.jpg.exe
Resource
win10v2004-20220812-en
General
-
Target
Shipment Document BL,INV and packing list.jpg.exe
-
Size
233KB
-
MD5
53e4a3efc351af944cf2076a1dfcde1d
-
SHA1
80c499867152c4baa991cad6127478affdce6548
-
SHA256
054939c5e1c596a28eceffd6fc10e70b46f46a47e0fbc6cf341799368eb1c462
-
SHA512
9eb3e33602905ae0a5f7ed385eebc7fa4b55e21f1e6d902c38fc5e5a222f3324916ae8e689013eb98dbc382ad094eeb01d7017a97f2c4a6f0e86d9aec4d3589e
-
SSDEEP
3072:zQHNmk8c/c8LYxWk3T/PBfRBJjWs7AM1fldMW/3eVvIiWYV:VBrWkj/P1RBJjyF
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oMWPCxXz.lnk Shipment Document BL,INV and packing list.jpg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1184 Shipment Document BL,INV and packing list.jpg.exe