Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12/10/2022, 15:20
Static task
static1
Behavioral task
behavioral1
Sample
879b5c147b541d66400dd9897db5104c53c50dcbe3469f96a4b646610b93965c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
879b5c147b541d66400dd9897db5104c53c50dcbe3469f96a4b646610b93965c.exe
Resource
win10v2004-20220901-en
General
-
Target
879b5c147b541d66400dd9897db5104c53c50dcbe3469f96a4b646610b93965c.exe
-
Size
1.6MB
-
MD5
7b9f46cda99145269c57ce3642cbcef9
-
SHA1
e1e24a6e4a30487d06fb9df17cc77f3433bc57e5
-
SHA256
879b5c147b541d66400dd9897db5104c53c50dcbe3469f96a4b646610b93965c
-
SHA512
46661932db0ec9a0129427d8b33a1c130a7001bb2a1b2cce4c5e30d1e1e5f2559a220115c1b30fd36b51faade21d62b843c939f24ec97787710202a752127599
-
SSDEEP
49152:hdY/Fc3VmoQiXdTJQFkDNy3TWP3rBViCA:hdY/FU0oQc1JQ+DmTWPrBViCA
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Company\MultiTranslate\MultiTranslate.exe 879b5c147b541d66400dd9897db5104c53c50dcbe3469f96a4b646610b93965c.exe File opened for modification C:\Program Files (x86)\Company\MultiTranslate\Uninstall.exe 879b5c147b541d66400dd9897db5104c53c50dcbe3469f96a4b646610b93965c.exe File created C:\Program Files (x86)\Company\MultiTranslate\Uninstall.ini 879b5c147b541d66400dd9897db5104c53c50dcbe3469f96a4b646610b93965c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.