Analysis
-
max time kernel
113s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
4f1a864bcb5db9c581029b494455dffddac72d7489450e665fb7ad472b2de83c.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4f1a864bcb5db9c581029b494455dffddac72d7489450e665fb7ad472b2de83c.iso
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
LearnS.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
LearnS.lnk
Resource
win10v2004-20220812-en
General
-
Target
LearnS.lnk
-
Size
1KB
-
MD5
386a24e1ea1787b14135b3164417b14f
-
SHA1
23c6c0293f5a1afd35e04c4e5757dc37a6f635d0
-
SHA256
9bb5f721a88adab24fb1b422684b5fce9142ed775ea7d472a0fd3b1d1aeac37e
-
SHA512
fa4f9ae17a0362b38ce36722d81d4ca2db6f2d070d4239f7fc4b6f855663dd658770be36bc80d25dc5c91248885cf729dacd26265c00b7e684cc0eb8cc09cc61
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4724 cmd.exe