Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:50
Static task
static1
Behavioral task
behavioral1
Sample
68b41e83b9e0e03a7de12870c35eccdb325b11a9fc1f1b3c705a65831da5317e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
68b41e83b9e0e03a7de12870c35eccdb325b11a9fc1f1b3c705a65831da5317e.exe
Resource
win10v2004-20221111-en
General
-
Target
68b41e83b9e0e03a7de12870c35eccdb325b11a9fc1f1b3c705a65831da5317e.exe
-
Size
7KB
-
MD5
4334c28350cf08985bdb489c7885e7b0
-
SHA1
19bdf2b54337cc74f43803ab084b03c61d49df67
-
SHA256
68b41e83b9e0e03a7de12870c35eccdb325b11a9fc1f1b3c705a65831da5317e
-
SHA512
e676ae34cd7c37a3ee1ba3c409f2f65196d561820c16464b87bf2ef8aea85364c3972b67992f4564760fc7caf3356d30b0c56c8dbc9137f7ec6c0cfe5036d67e
-
SSDEEP
192:ggNJ5UOtC6bBDyBW3l0vdV+icAEBmIg3tQ:U6bBX2vDLaBmIqW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
68b41e83b9e0e03a7de12870c35eccdb325b11a9fc1f1b3c705a65831da5317e.exepid process 960 68b41e83b9e0e03a7de12870c35eccdb325b11a9fc1f1b3c705a65831da5317e.exe