Analysis

  • max time kernel
    163s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 20:21

General

  • Target

    2952609041f6385d879eb1dc8bb8245501e7e962a14a32b3b5b85ec244e81095.exe

  • Size

    640KB

  • MD5

    84183197ab736f1416adcd62225b3dc1

  • SHA1

    61a99ef661b2b75f9999050d4c5bd5f8e3e49acb

  • SHA256

    2952609041f6385d879eb1dc8bb8245501e7e962a14a32b3b5b85ec244e81095

  • SHA512

    d9446140c52a7e83b1e505d07aefa7d32df99d34a574e6501979723aa074bc3fb10b0898201adc308f513823008ed4bdaab95b282ed7925bccc7c4def06183f7

  • SSDEEP

    12288:JAzRtGCrIoSJCC7GScRuv9pUcCbB/nV92Ete0w72cT1xqeA3WOiPoL:J+1TACCaS7g9tLW2cBYeAGVE

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2952609041f6385d879eb1dc8bb8245501e7e962a14a32b3b5b85ec244e81095.exe
    "C:\Users\Admin\AppData\Local\Temp\2952609041f6385d879eb1dc8bb8245501e7e962a14a32b3b5b85ec244e81095.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2816
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c start C:\Users\Admin\AppData\Local\Temp\subfile.jpg
      2⤵
        PID:4904

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads