Analysis
-
max time kernel
25s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21/11/2022, 15:14
Behavioral task
behavioral1
Sample
744ca36d4ea072e4628654b55b28500e7d9f2c33dd40b3349c964e9ee516980e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
744ca36d4ea072e4628654b55b28500e7d9f2c33dd40b3349c964e9ee516980e.exe
Resource
win10v2004-20221111-en
General
-
Target
744ca36d4ea072e4628654b55b28500e7d9f2c33dd40b3349c964e9ee516980e.exe
-
Size
389KB
-
MD5
21d507733c1e306460bda3c23e4b6760
-
SHA1
3c4a81713c6ccaf83ceca48aa57cfc68eea28deb
-
SHA256
744ca36d4ea072e4628654b55b28500e7d9f2c33dd40b3349c964e9ee516980e
-
SHA512
05997e17c5dae42827cc03f6fca47898569df0655fabee92fe6fcf66fcdbe50c0839f8834b6f2b3845de9dc4036fe3f609d8ea813e4fe01560b03e587097d5ed
-
SSDEEP
6144:7no7WPJ1OeSyWzZrkLDkOcWTAbz7lS79Krhiz4FTiSoNoR+Mg2nRHOm3maXt:7ngwSxFYLDkOcWkU9KozE1OBaXt
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1324-55-0x0000000000400000-0x00000000004E4000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1324-55-0x0000000000400000-0x00000000004E4000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.