Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:46
Static task
static1
Behavioral task
behavioral1
Sample
Job_Description.vhd
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Job_Description.vhd
Resource
win10v2004-20220812-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Job_Description.vhd
-
Size
13.0MB
-
MD5
3ce53609211cae4c925b9fee88c7380e
-
SHA1
2ca125424de74d2385c01f5d8b7bed77feebbda9
-
SHA256
826f2a2a25f7b7d42f54d18a99f6721f855ba903db7b125d7dea63d0e4e6df64
-
SHA512
79ca4164e4badfbccd532b6c09f74dbe805490a92a8bd2df480a8bbc1ae3697f066955ca3c44d50afc552bde1b778f3df9f7c40959eed48efa680ffcd627fe9e
-
SSDEEP
49152:Kb/Gr8SoHQSOOkwPOiA/86xLa8jBaV9SfpOYqQ/jBJictNmIvc8qB:rr8ZhkYm86tjjUCOqjbiUNmQbq
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe