Analysis

  • max time kernel
    38s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2022, 18:12

General

  • Target

    30900aa70bf6d2810a238ffd5970d2e5c2a43b153d00b34a1b4f2ffb054885cc.exe

  • Size

    7KB

  • MD5

    40b1ec9f0eb2f95da5541792ac561eb2

  • SHA1

    01f6025fd585090f56163b1ac9edd17bcb47691f

  • SHA256

    30900aa70bf6d2810a238ffd5970d2e5c2a43b153d00b34a1b4f2ffb054885cc

  • SHA512

    839e3c25314c8690d2947490d0b3ee5654250103a2ae4ab5a378e7f7c43d642d63900bb9d423c78b4a6eb64aa2d0fe4fc270f6411d66f8ab545ad6c96f777eda

  • SSDEEP

    96:e7p9mCOBB7QSCMkJxuJRd9EWWuOWwb4wf4tW1:e99mCOB7CMkJxu/kW/OW0f4tW

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\30900aa70bf6d2810a238ffd5970d2e5c2a43b153d00b34a1b4f2ffb054885cc.exe
    "C:\Users\Admin\AppData\Local\Temp\30900aa70bf6d2810a238ffd5970d2e5c2a43b153d00b34a1b4f2ffb054885cc.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    PID:1372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1372-54-0x0000000076261000-0x0000000076263000-memory.dmp

    Filesize

    8KB

  • memory/1372-55-0x0000000001000000-0x0000000001004B00-memory.dmp

    Filesize

    18KB