Analysis
-
max time kernel
90s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:27
Static task
static1
Behavioral task
behavioral1
Sample
31d908ba0e564c63e451415572986a330ce59ee1315ef3c481990053b067b241.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31d908ba0e564c63e451415572986a330ce59ee1315ef3c481990053b067b241.exe
Resource
win10v2004-20220812-en
General
-
Target
31d908ba0e564c63e451415572986a330ce59ee1315ef3c481990053b067b241.exe
-
Size
2.4MB
-
MD5
ae9bbaec27a038d5451fbae89c397b46
-
SHA1
ac3604346d0d8179000b04d59e63a31dbda667d8
-
SHA256
31d908ba0e564c63e451415572986a330ce59ee1315ef3c481990053b067b241
-
SHA512
8e131139d5d0410ead72a0f27968794346348ea2bec97b14c5c0ef1103d4a68df9d14db272a97fbe73e24c1cdfdd6d99da2262dc39739a8d97b08214b1e1c112
-
SSDEEP
49152:k05W2bBAOVDldB+EX8TKqvH8woarAROt9f8nlpgNoAmrSlWrxMNWAwAcy:X79jbdBb8TKsH8paV9EnlpgCSlWrx2W4
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
31d908ba0e564c63e451415572986a330ce59ee1315ef3c481990053b067b241.exepid process 2776 31d908ba0e564c63e451415572986a330ce59ee1315ef3c481990053b067b241.exe 2776 31d908ba0e564c63e451415572986a330ce59ee1315ef3c481990053b067b241.exe 2776 31d908ba0e564c63e451415572986a330ce59ee1315ef3c481990053b067b241.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nslFDCE.tmp\InstallOptions.dllFilesize
14KB
MD5fa5beae80dba254fb6c21b58265f5310
SHA1f2f776611dbbb157b151aa744a7e0be1d4b8c079
SHA25634b8a2130729064ca2f9b3b8e6f90d883d84662156b648a4eeccefefc3473269
SHA5127c74b9e9f1ff0665ffd6fcf76fca462d9f4fbd7c4a215bc67b419497ef4c3cb9cede6c5b0803cabb316bc5391c4c6f0d578d36e1094b8ed326b140f8e272b538
-
C:\Users\Admin\AppData\Local\Temp\nslFDCE.tmp\LangDLL.dllFilesize
5KB
MD57eaad8c651cdeb4a71355b10dbe8d17b
SHA11ef6cf4f98c7f20238e548dc6cdb270b741cfe8b
SHA256fad96602241e65daeef96b559092e7efa2c3b68948a65f1bd7f126b9963df468
SHA5126f7867774bfd82b1d12d0db5479e9539440ebfc6fee54aafc4381edea8fdccb89a9521a60b5f907033c147c805e6f541ec534c56bfe5f7354c55ca04df5175b9
-
C:\Users\Admin\AppData\Local\Temp\nslFDCE.tmp\UAC.dllFilesize
17KB
MD509caf01bc8d88eeb733abc161acff659
SHA1b8c2126d641f88628c632dd2259686da3776a6da
SHA2563555afe95e8bb269240a21520361677b280562b802978fccfb27490c79b9a478
SHA512ef1e8fc4fc8f5609483b2c459d00a47036699dfb70b6be6f10a30c5d2fc66bae174345bffa9a44abd9ca029e609ff834d701ff6a769cca09fe5562365d5010fa