Analysis
-
max time kernel
23s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-10-2022 21:35
Static task
static1
Behavioral task
behavioral1
Sample
6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe
Resource
win10v2004-20220812-en
General
-
Target
6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe
-
Size
320KB
-
MD5
0c0deb9d2653e2e87898f5cd20824050
-
SHA1
b7e0923abf16fc454b2a26cbca9e87bb5b25bd1a
-
SHA256
6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061
-
SHA512
95866740ebb74a857532c3932ca91b2abdfd0627ba24be7d3433d2c5450adc0fb7897c4b48492cfec74e017cf1032e11be121ed1e554591716fc4b7f924e97e6
-
SSDEEP
6144:ti+xPxlJGiiB8J66onJGr+qyVztumGS5Ni3hpgoMKMphaeVf2B717z:ttPjJGiic6JGr+qyVztumGS5YqoyU71/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1072 6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe"C:\Users\Admin\AppData\Local\Temp\6eb1c157351fe9e5aa0149b52dbd6eada88fbba3d39a5e6ee45686e513169061.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\jztiis.exe"C:\Users\Admin\jztiis.exe"2⤵PID:1388
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5a244ba217f6d31e842eafc8373b9ea73
SHA139aa0a1e82107e1414952e76a4a970e265138050
SHA256cf99356d53708b2da29e0143b81d05da9301b744e95523f805b41b973b235afc
SHA5124670a3f020dfbfc83ea9d2c85c449b402e2b2592d5e06393b9e53890752a6b6a2d5269c38ae4f8d5afac90df1c9c166d95f21ae8debac252d663741972bbabe2
-
Filesize
30KB
MD55494d5ef4557541c93965824c33afd79
SHA15b447020254f2283a97149bcc244da84449edfb0
SHA2564d83a86836b06b38c92791ef1b573b738a477baa64f9c19b5c9cab94be3f4648
SHA51217ca9ddaadb16634e3786aae3c4ed0f348d41cca593333035f8c8df116b2e58d91a846916d098f899297579078824ca044c87bc44146cb6c069bc8e06ee001e5
-
Filesize
45KB
MD5c69d4d11fbfcf8c3198a56b8212a2d21
SHA1cf829aeef4be158296ade266506496ab3218bd5d
SHA256dced1d312afc6ff42d96bf4f1293343e6a23c0d54d3a15c9fe18222a833ae6c9
SHA512e1bf96089f021221b220814be6dcea74e92f7796f105b0fc634a4b3acee331f0e5c7b285524a14b9f40e2da8662d7e3af38f56cb84bcda8ff291142e1ffa217d
-
Filesize
35KB
MD5b68068ab447703464cc670c9a46bec42
SHA1264819ac93a971220b9b40e953a50a4fb819c909
SHA256a0d5eca72e3dce86e1faad09231c2aaaa4f5483e82204629bedf4ac71ea82300
SHA512f6c0dcfeb1fb8ca03c3c014b9186c04add53b8aa34de225acc93d0dc1497f6adf1442b11382ac18754863ffbfb18abd6de10f422519563250356ab13ede3887c