Analysis

  • max time kernel
    166s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 13:52

General

  • Target

    Trojan-Ransom.Win32.Blocker.exe

  • Size

    72KB

  • MD5

    128f6fe745dffcbee10e2c9132b2311a

  • SHA1

    59f49c85c8651e06e4eae0cd3326f26261b26e25

  • SHA256

    3a3ebf488b09ef7ceadf3f1fc40f71d59e5040b5f4bc49d832d47a4a4d02ec6c

  • SHA512

    3ecfb71924dd3521baae32380546f5e22813a07b70dc5ea16218c8e1cf4fa3d31fa3e23a734add35adf34a284a219949b2c671b0aac441293df0b05d11892408

  • SSDEEP

    1536:bAjoQB6xerOExwHUFAkVP0CJKvjktSw+11d:bemerO7+KvYtSwyn

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan-Ransom.Win32.Blocker.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    PID:444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads