Analysis
-
max time kernel
182s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 12:59
Behavioral task
behavioral1
Sample
e6873395d12f40cf49ebff7f274370316aa11b0dab109a1e00894c4d191977fc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6873395d12f40cf49ebff7f274370316aa11b0dab109a1e00894c4d191977fc.exe
Resource
win10v2004-20220812-en
General
-
Target
e6873395d12f40cf49ebff7f274370316aa11b0dab109a1e00894c4d191977fc.exe
-
Size
2.5MB
-
MD5
4e693a02b81a9b2e4a7573ec1e54bbd4
-
SHA1
906e50de79a732bee32c09e79e45f0a1ae758900
-
SHA256
e6873395d12f40cf49ebff7f274370316aa11b0dab109a1e00894c4d191977fc
-
SHA512
c0474624e3e92cee8d06dc286fd7eaa9e3960a36f4c073db34f6cfa6767dea269b1e265cb165c01a4e1c2bd1ed95e9b4841db4a25fe46e49e084e3be230dbf5f
-
SSDEEP
49152:rUeedVTfE98rTTINj3z9iRZ3toOsezg1sE4oCBC6M7sXdM1+WHSk:r7ed29UqjEZdoOXHo/MM+WHSk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1064-132-0x0000000000400000-0x0000000000460000-memory.dmp upx behavioral2/memory/1064-133-0x0000000000400000-0x0000000000460000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.