Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01-11-2022 07:24
Static task
static1
Behavioral task
behavioral1
Sample
mailservice.png
Resource
win7-20220901-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
mailservice.png
Resource
win10v2004-20220812-en
windows10-2004-x64
1 signatures
150 seconds
General
-
Target
mailservice.png
-
Size
250KB
-
MD5
47d00ca63fe932db4654c0936f60bdee
-
SHA1
54c78116fd4249d9ff8da875c39f73593534dff5
-
SHA256
3230e63ccebd648b51ddefaad0f57d1911a77fcb1e7c66addc9fb03dc8c13ca5
-
SHA512
a8ade229dc2ac5498e8879d22de32a8f039dd4ad62077ff1049cd5b2c11a1e273d6d58e163fa5bca1c9368c35163f9ddff20d690d19192cd3260dd4c13837688
-
SSDEEP
6144:j65J/1sTDuXHEfOcaD8xm4YxDUrxn9B3keW:ep1sHu3EmcG4YZUrxnbkP
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1048 rundll32.exe