Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25/10/2022, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
069477c1c442b212138b86c062120778fc17154f812bc82248b05fdb64863cb4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
069477c1c442b212138b86c062120778fc17154f812bc82248b05fdb64863cb4.exe
Resource
win10v2004-20220812-en
General
-
Target
069477c1c442b212138b86c062120778fc17154f812bc82248b05fdb64863cb4.exe
-
Size
2.7MB
-
MD5
e07801a5a58a560f482018ea535d6a7f
-
SHA1
0a619da66e69e2679321f7a834ee172a2cee229a
-
SHA256
069477c1c442b212138b86c062120778fc17154f812bc82248b05fdb64863cb4
-
SHA512
f43fbf423189de98de6de634783a7635987c7f02ed54d7d711f0869893c4ae0e8e3604378c26836892ebc495f4dd928d1475dd0ebb10376303840dcdfe611ad4
-
SSDEEP
49152:ypehJdJEiULIYh9WM6+p7SU3U4B1/tDdUvNoiuu85YM7ZZcKEkGTxA5xp+4fe:ypeHrEiULIYh9WM6+pG9UVg/IV6Qx+ie
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\FILTER\TEXT/XML 069477c1c442b212138b86c062120778fc17154f812bc82248b05fdb64863cb4.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 752 069477c1c442b212138b86c062120778fc17154f812bc82248b05fdb64863cb4.exe