Analysis

  • max time kernel
    94s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 03:54

General

  • Target

    a22befe39e3b79002efe9da879b02a9575ffe05ac01ba79e17936aca6e7f4c32.exe

  • Size

    43KB

  • MD5

    7c79da8c319407cdd7f932886abff410

  • SHA1

    b63284480f04baa7970c1099f9099fdf425baf4f

  • SHA256

    a22befe39e3b79002efe9da879b02a9575ffe05ac01ba79e17936aca6e7f4c32

  • SHA512

    d35736906b1ecbba1ad61d8b69bf33d8ea308b31dbda387f41f2ac7402618684db497b381a389ce03dc17c217e658c32d9125b25bd8f49d4d3b3ead899e1d1f4

  • SSDEEP

    768:ewyvF86pALgSOOk49rG9uT82m258156H8jH6mqvtq1MvE71yr4NFWHlHCCjPkaG6:QFuFocUm2VC4CHCCrk

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a22befe39e3b79002efe9da879b02a9575ffe05ac01ba79e17936aca6e7f4c32.exe
    "C:\Users\Admin\AppData\Local\Temp\a22befe39e3b79002efe9da879b02a9575ffe05ac01ba79e17936aca6e7f4c32.exe"
    1⤵
    • Modifies registry class
    PID:2376
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2376-132-0x00000000747D0000-0x0000000074D81000-memory.dmp

    Filesize

    5.7MB

  • memory/2376-133-0x00000000747D0000-0x0000000074D81000-memory.dmp

    Filesize

    5.7MB