Analysis
-
max time kernel
36s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-10-2022 02:47
Static task
static1
Behavioral task
behavioral1
Sample
6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe
Resource
win10v2004-20220901-en
General
-
Target
6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe
-
Size
149KB
-
MD5
41f8d8df05c0f1faed107428c6ab990b
-
SHA1
814046581700127f1404cc0dfb19140510e74a76
-
SHA256
6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b
-
SHA512
0b2fe65354f2d8bd6e89d96ca9826f56a0d6741603559097c11d7c8a8cd6f822fda82d4010ab128f80f5b2d84f0d2dca09d7de058851cec3f59ea55c8a805735
-
SSDEEP
3072:0H21OD+wHZmJOsuQbFn8PBE6RHkwinFYvpCiP732E91G/MB0N5f1YUWnr:qHjwu28PBxREwinF0oYl+HLkr
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\acpidisk.sys 6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe File opened for modification C:\Windows\SysWOW64\drivers\acpidisk.sys 6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe -
Loads dropped DLL 3 IoCs
pid Process 1344 6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe 1344 6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe 1344 6fd5111a229f31d12c0b29695a827c8d5e210ded263b15650fc371616f12c46b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5f33feac41b83c279f7efa5381aa6837d
SHA1154de1571818f1ed0c3ca1b5aef1d0433d26caf1
SHA256796c4e0dff25e86b1c028c1b48973960e9db8cd86dfc4dc2046dd207ad56c863
SHA51212af2e6ebe7be6b9337e9e0dcb09b0b6abe52a9769e0ae8213cbe43359e6842bf6181ec0a0064e13d01dc47dc42c83e444120320223542d5477039c57f58a404
-
Filesize
10KB
MD5bf01b2d04e8fad306ba2f364cfc4edfa
SHA158f42b45ca9fc1818c4498ecd8bac088d20f2b18
SHA256d3f9c99e0c1c9acd81a1b33bc3dbd305140def90d10485c253cf1d455f0dc903
SHA51230ca1663d659c5efac7fed3d1aaba81c47d5d5fda77f30f021124c882b858732e17f917bfd0aa3ee7b269fad86e75b1b9388d8f916e7a4e2c9961669f2c772e7
-
Filesize
10KB
MD5bf01b2d04e8fad306ba2f364cfc4edfa
SHA158f42b45ca9fc1818c4498ecd8bac088d20f2b18
SHA256d3f9c99e0c1c9acd81a1b33bc3dbd305140def90d10485c253cf1d455f0dc903
SHA51230ca1663d659c5efac7fed3d1aaba81c47d5d5fda77f30f021124c882b858732e17f917bfd0aa3ee7b269fad86e75b1b9388d8f916e7a4e2c9961669f2c772e7