Analysis
-
max time kernel
33s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 03:36
Behavioral task
behavioral1
Sample
f9f9ba4daac4d60a8f6456479a885c5ac6bbe89236c6988e1749620a3d3a1e91.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9f9ba4daac4d60a8f6456479a885c5ac6bbe89236c6988e1749620a3d3a1e91.exe
Resource
win10v2004-20220812-en
General
-
Target
f9f9ba4daac4d60a8f6456479a885c5ac6bbe89236c6988e1749620a3d3a1e91.exe
-
Size
447KB
-
MD5
782330984e04bd395b770f255b6ab763
-
SHA1
406e133551fe02efe8c57e04d59a97c617cf7f0f
-
SHA256
f9f9ba4daac4d60a8f6456479a885c5ac6bbe89236c6988e1749620a3d3a1e91
-
SHA512
69be3c8d09aefe8b9c8704bba591988528c6db4c4324d29df28d783159ad7e7c98566e09659a217ec6768dd92d2e92f4ac89765da980396c80d9ea452cf99037
-
SSDEEP
6144:y60XjJgmx9jfumGiKW+s+9H/WdLb9lJ9uEYFWhs7YM2BszK:yFGHJDfuX939uV
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1388-55-0x0000000001000000-0x0000000001098000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.