Analysis

  • max time kernel
    124s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 04:18

General

  • Target

    387d5cdb31e2eab59e5a3b59b02c68c433054441cb161074870136ea2c70e8dd.exe

  • Size

    98KB

  • MD5

    20edbffc5a44d4e49befdba7765ba3b7

  • SHA1

    bea9d3a71fd6e9aa8c12535ce90487fd6f4382a0

  • SHA256

    387d5cdb31e2eab59e5a3b59b02c68c433054441cb161074870136ea2c70e8dd

  • SHA512

    16e0629dda46b6ef077007ad701e03a97fcb31301b4c6af9261ca2b926abfa443d9ebcac55456b0b28bbb62537b1754f5b976eda9efcd062b601b14211f12041

  • SSDEEP

    1536:YrSR9ieUOc+/RAhDcktPLXbbxAyQIrZBQlgSJ0TWS3:GSR8Y6hD7AyQIrZBbSJK3

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\387d5cdb31e2eab59e5a3b59b02c68c433054441cb161074870136ea2c70e8dd.exe
    "C:\Users\Admin\AppData\Local\Temp\387d5cdb31e2eab59e5a3b59b02c68c433054441cb161074870136ea2c70e8dd.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Modifies registry class
    PID:1368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1368-54-0x0000000074E41000-0x0000000074E43000-memory.dmp

    Filesize

    8KB

  • memory/1368-55-0x0000000073761000-0x0000000073763000-memory.dmp

    Filesize

    8KB

  • memory/1368-56-0x0000000000330000-0x000000000034C000-memory.dmp

    Filesize

    112KB