Analysis
-
max time kernel
134s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2022 08:24
Static task
static1
Behavioral task
behavioral1
Sample
4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe
Resource
win10v2004-20220812-en
General
-
Target
4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe
-
Size
225KB
-
MD5
93e587567da77cc5e0d2f376545e7fe0
-
SHA1
2af868dab0a6012375ab4d0a70ef589bc8036aec
-
SHA256
4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de
-
SHA512
2377ab758478b6a2a67d1d1466e04494181ed58176b8ec25737ca47903fc3309b6515faf3c8e77fd7610edbddbcf01908372a68a66023b0470b1996ef2042a4e
-
SSDEEP
3072:NQIURTXJH451v0hKiuCt06J34TdQYcZEFwPhoTbf8vBYJdYrjxk+BdeMiksdkV+C:NslOshKiPcQYcZEFsoTzT4O+bebkmIr
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3872 4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe 3872 4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe 3872 4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe 3872 4a747d4fac877f1360e277ad747a8691c2f45204dd995ee345c70df174ce06de.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399