Analysis

  • max time kernel
    197s
  • max time network
    209s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 10:47

General

  • Target

    7df1a698dfa5e630b33fe366baa48ceef77bc3026d0b9b0e178f9fd6de2637a2.exe

  • Size

    1.7MB

  • MD5

    a66282481f48517e949391e3934893c4

  • SHA1

    2175ad550cfe6cb1c5623879a33570a6650468d3

  • SHA256

    7df1a698dfa5e630b33fe366baa48ceef77bc3026d0b9b0e178f9fd6de2637a2

  • SHA512

    f25510e2c8685a068b3a6a37921c50c293d1e0282610db0c9cdaf5764a99e65a15be5def754417384f0cfb15852236d31c56fa01a0ad3689de79292b9aafd303

  • SSDEEP

    24576:K2NJ7Ivu9SQHEer6bXqs7W6ev2BBoS1A8LgbOjmsa:5qf7382BKS1sO6sa

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7df1a698dfa5e630b33fe366baa48ceef77bc3026d0b9b0e178f9fd6de2637a2.exe
    "C:\Users\Admin\AppData\Local\Temp\7df1a698dfa5e630b33fe366baa48ceef77bc3026d0b9b0e178f9fd6de2637a2.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • Suspicious behavior: EnumeratesProcesses
    PID:2696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads