Analysis
-
max time kernel
12s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
f20d4ac6bc6f0873bc106dbbfde21901eb841b0d67ff7f2add9c37a6c2b90da2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f20d4ac6bc6f0873bc106dbbfde21901eb841b0d67ff7f2add9c37a6c2b90da2.exe
Resource
win10v2004-20220812-en
General
-
Target
f20d4ac6bc6f0873bc106dbbfde21901eb841b0d67ff7f2add9c37a6c2b90da2.exe
-
Size
60KB
-
MD5
7ef2517e1c2819fa4ed127f98445dd3d
-
SHA1
b3fee72f164da60bdb068023bab7dbedfc352150
-
SHA256
f20d4ac6bc6f0873bc106dbbfde21901eb841b0d67ff7f2add9c37a6c2b90da2
-
SHA512
ffc886beb1d79f6237d097dfa489a323752ca1b9efd3f5fe8c0b5128d615d24bf3f1ee639a24403bf4b19eb660f293706647a2b198d0f1980b0727f7478caf88
-
SSDEEP
1536:uFo9rVDgXkfyWjZRwp6/OrCF/w12TItl+zEK:R9GXCZRwpiOY/w12TSvK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1980 f20d4ac6bc6f0873bc106dbbfde21901eb841b0d67ff7f2add9c37a6c2b90da2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f20d4ac6bc6f0873bc106dbbfde21901eb841b0d67ff7f2add9c37a6c2b90da2.exe"C:\Users\Admin\AppData\Local\Temp\f20d4ac6bc6f0873bc106dbbfde21901eb841b0d67ff7f2add9c37a6c2b90da2.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Users\Admin\xauig.exe"C:\Users\Admin\xauig.exe"2⤵PID:932
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD59bb818f862841fcef7db3342d5fdbd36
SHA192d1913f36b5ecaad56a8e5ccc0e999650c0e5e6
SHA2568ccda20c8b261d99203b0388abebd4542131a78be8299ba30eb616622e998b39
SHA512214463b4474b554172efba775fd4100ddfe10483edde8f5398aa4ba77172acd7b5e40b38325cc4706b620fa57a9f6c752a5418baf9f82356384077270c8981da
-
Filesize
4KB
MD57c6ef7f9d68f23d5949eccf048e39849
SHA1bee285a9596d45028faf49eeb1459835bad63789
SHA2562ee36898adf73ff8cd49c97705499dea404bd675bd4a70f65f2161208b83d11b
SHA512b96f8e1692d88d605d88910c3b63f5d4a223e537673dc7d4d303ea7d6c231742d70f08d9cd555ef39226d8902040787b9d60fbbac618ee07094e361475e85110
-
Filesize
13KB
MD5e1de1d8b153b4d3d9d270b3c1e5128f9
SHA12e38a7a88a47d4eed24110ca9d97bd2d384ccebf
SHA256d67c62add80146c1fd5903197dbdcee3c5c1c76f8386bb4f3d3760f3c6d02e99
SHA512efc51aa3d5423cd7942096e14b30c67e062c2f375ba5117fe9eb9392256366bd3408ca2adde5b05237ca18520db7b05ec400856ac7a97d03f4a069282dcd8218
-
Filesize
27KB
MD59158b4e76b32f4c03daa85d8dfc90b73
SHA1e7b5c8fbda92c2dcff426a4f2a5b6259c5f60419
SHA2562b56fa89752a1b99fee12b76051a4d786dfb1db8cc95d3fa8089a299f8107b6d
SHA51288e34a00ea5c712517d16a63df16c7a33093aa0cc8f13d7d1fe0b090bb2c0c03fab9cf0eeea3d851e191d10a0eb3e9685cf5a10106c93f90792972d1334f676b