Analysis
-
max time kernel
133s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 08:30
Behavioral task
behavioral1
Sample
53ab4dc8d9f6d615917214b0d986115096e911c7da93d6dde1d26b63e68c38c0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
53ab4dc8d9f6d615917214b0d986115096e911c7da93d6dde1d26b63e68c38c0.exe
Resource
win10v2004-20220812-en
General
-
Target
53ab4dc8d9f6d615917214b0d986115096e911c7da93d6dde1d26b63e68c38c0.exe
-
Size
307KB
-
MD5
0d5bb88408dcbe17881d8ca63d61d014
-
SHA1
4ffa2198394897377f69282a0afc770085630826
-
SHA256
53ab4dc8d9f6d615917214b0d986115096e911c7da93d6dde1d26b63e68c38c0
-
SHA512
de078616bbbca3be1c6e07105b0faeed68835f2effd82c6a1de4fcc1be08b780a65dd6aadee5f842710020eb1c31b1c4214ab3c6737e74602fc15fa5d44d594d
-
SSDEEP
6144:j1db49+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe/ZVJy2wvw8fWk:jjkArEN249AyE/rbaMct4bO2/vLj8J
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3996-132-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/3996-133-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3996-133-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.