Analysis

  • max time kernel
    45s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/11/2022, 20:02 UTC

General

  • Target

    95adea9480e955c634d3c54bf5d657066d72fcfc8653a50d4f150e4243079c10.exe

  • Size

    64KB

  • MD5

    e166fce26f771499bab1df406c699824

  • SHA1

    ed837a6de4488c48caa6b42c5c4ab71406d86d46

  • SHA256

    95adea9480e955c634d3c54bf5d657066d72fcfc8653a50d4f150e4243079c10

  • SHA512

    982fc875a992b875e1271338af2e8e0493113f26a3f30fe80b84a57c07b4e6033dd1a70f9908f46d31e04cdc1450d5168d2ea60adedfce4519f474fb30788edd

  • SSDEEP

    768:/t39pEcCoc7z9e/Zd58gwgHR8XC853+Y3mtJ4:/t3nly0/hPHq53wr4

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95adea9480e955c634d3c54bf5d657066d72fcfc8653a50d4f150e4243079c10.exe
    "C:\Users\Admin\AppData\Local\Temp\95adea9480e955c634d3c54bf5d657066d72fcfc8653a50d4f150e4243079c10.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:1340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1340-56-0x00000000758B1000-0x00000000758B3000-memory.dmp

    Filesize

    8KB

  • memory/1340-57-0x0000000003450000-0x00000000044B2000-memory.dmp

    Filesize

    16.4MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.