Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
2640822b58289f4ed0fcb0df412aa3b2e49c39cf7f8f9a5a4d292f9ff079bc14.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2640822b58289f4ed0fcb0df412aa3b2e49c39cf7f8f9a5a4d292f9ff079bc14.exe
Resource
win10v2004-20220901-en
General
-
Target
2640822b58289f4ed0fcb0df412aa3b2e49c39cf7f8f9a5a4d292f9ff079bc14.exe
-
Size
1.1MB
-
MD5
039b83d6ada060aa1ddc1b9f12b2fb24
-
SHA1
50ceb70e58235e5d2580cf12ac617396f3ce0da6
-
SHA256
2640822b58289f4ed0fcb0df412aa3b2e49c39cf7f8f9a5a4d292f9ff079bc14
-
SHA512
64813fe2ceca2d8eb78f3ec8bb4a4f724f84af6d93ac442b723730c6769080b1f28117d2d6f53e12d9d41a17c95add6fa5f403ce78abe9f3cbe26ea366b423db
-
SSDEEP
24576:lyt0eNfxyWMGGly/O000VOgLuwtygxUVhBN:8BfTUy/O077LuQAhBN
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1096 2640822b58289f4ed0fcb0df412aa3b2e49c39cf7f8f9a5a4d292f9ff079bc14.exe 1096 2640822b58289f4ed0fcb0df412aa3b2e49c39cf7f8f9a5a4d292f9ff079bc14.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5506c3c960514dd01dff48c5d82d0ce08
SHA15740cebaa50971d1bdfc99e0a9fb0d9f7a7eeb31
SHA256e758f90c55c6cf5055fb3251d4e92ffdf06a6ed79d46072db308ab4b588f0b19
SHA5124ae83ecd3192dc68da386e0e458caf9aed2473f4ee2beb5ba81021fd828a15c0227a464d33d1eaaad1862b27301cd1afd7e557db44164ae56793a119df943f66
-
Filesize
8KB
MD560bef38f7ecb037d4541203a79ba7e07
SHA134093fbab7c7e6d36127e0d04309522fd71b58d4
SHA256756031c51fe9982673f11f81f46e9f7b78ae78444aaec1b000de6217ddebc9fe
SHA51266f99e7bd71fcb5a8531583f4b7ae4e47cbc741f131deabda3e96aeff7bd6d04ce9bb9c9370548d6a93709182c9025b918d6f4cf06ddff07b66ccf8c1bbffb0d