Analysis
-
max time kernel
27s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 08:39
Static task
static1
Behavioral task
behavioral1
Sample
Quarantined Messages.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Quarantined Messages.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
ffcfbe72-cb97-4d57-2284-08dacd133a69/96bc5dc5-7f24-5cc9-7579-52f3ef64e6af.eml
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ffcfbe72-cb97-4d57-2284-08dacd133a69/96bc5dc5-7f24-5cc9-7579-52f3ef64e6af.eml
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
email-html-1.html
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
email-html-1.html
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
song.png
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
song.png
Resource
win10v2004-20220812-en
General
-
Target
song.png
-
Size
3KB
-
MD5
9f14c20150a003d7ce4de57c298f0fba
-
SHA1
daa53cf17cc45878a1b153f3c3bf47dc9669d78f
-
SHA256
112fec798b78aa02e102a724b5cb1990c0f909bc1d8b7b1fa256eab41bbc0960
-
SHA512
d4f6e49c854e15fe48d6a1f1a03fda93218ab8fcdb2c443668e7df478830831acc2b41daefc25ed38fcc8d96c4401377374fed35c36a5017a11e63c8dae5c487
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 1780 rundll32.exe