Analysis

  • max time kernel
    47s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 08:58 UTC

General

  • Target

    85f8123b31f1f42b6dca2dcef9c7d956bd868dd294468b432548fd1d5614718e.exe

  • Size

    102KB

  • MD5

    0df84e96e05edb49571cb140ffd9bfb4

  • SHA1

    21d346931a3770878e11409b686163c54204a4a6

  • SHA256

    85f8123b31f1f42b6dca2dcef9c7d956bd868dd294468b432548fd1d5614718e

  • SHA512

    1333da762e0d292b93203d1277906be7070299afde25209b7c6bab3ea6448884098b17d67d6f2c639d94dd3469c4427e6d4a445d7c2b4b05e1bebaf877a26da5

  • SSDEEP

    192:Oxk/1W41F8RfFB1oynJjAa/wzWuAQvc9yZpGYR5hIRWeBXPkegAXEp:OuGNB1jev/nhR529BXPkehE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85f8123b31f1f42b6dca2dcef9c7d956bd868dd294468b432548fd1d5614718e.exe
    "C:\Users\Admin\AppData\Local\Temp\85f8123b31f1f42b6dca2dcef9c7d956bd868dd294468b432548fd1d5614718e.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3220

Network

    No results found
  • 13.69.239.72:443
    322 B
    7
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3220-132-0x0000000000400000-0x0000000000418000-memory.dmp

    Filesize

    96KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.