Analysis

  • max time kernel
    90s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2022 22:13

General

  • Target

    13be15f6a616492f6b0337a92904fea93faa54c3b2a25a8584a22cbeb16005a8.exe

  • Size

    3.5MB

  • MD5

    c738f0f966954593989c0d99494bb87b

  • SHA1

    a8197de5ce6c3d3a49b3beaf8d3538ff43ee9c4f

  • SHA256

    13be15f6a616492f6b0337a92904fea93faa54c3b2a25a8584a22cbeb16005a8

  • SHA512

    2508145638308658d8d61468fa895d95aea20e2450f3f812720968a86f7fd33cabbf571daf53a571821beab557ed277c239a9ff51ba7fe5b070442b46bcb6895

  • SSDEEP

    49152:/ufHLkgsOS6lSWTKVUMghsLgkXvJVn0oG5tCZktDqpdmhMPJ9xpfqT:grkgsx6lSWTI1LgAvJZr4tCmtCFp

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 24 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13be15f6a616492f6b0337a92904fea93faa54c3b2a25a8584a22cbeb16005a8.exe
    "C:\Users\Admin\AppData\Local\Temp\13be15f6a616492f6b0337a92904fea93faa54c3b2a25a8584a22cbeb16005a8.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1808-132-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-133-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-134-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-136-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-138-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-140-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-142-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-144-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-146-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-148-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-150-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-152-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-154-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-156-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-158-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-160-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-162-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-164-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-166-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-168-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-170-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-172-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-174-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB

  • memory/1808-175-0x0000000010000000-0x000000001003E000-memory.dmp

    Filesize

    248KB