Analysis
-
max time kernel
146s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 16:54
Static task
static1
Behavioral task
behavioral1
Sample
6e87d09fb03990385abd0c91d723a15472f7775799a2410c339a536e140074fa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6e87d09fb03990385abd0c91d723a15472f7775799a2410c339a536e140074fa.exe
Resource
win10v2004-20221111-en
General
-
Target
6e87d09fb03990385abd0c91d723a15472f7775799a2410c339a536e140074fa.exe
-
Size
31.1MB
-
MD5
3fa717ff26bdf951009ffc121a511d7e
-
SHA1
783edb778aa28e13def1407f99c736ff7db1f99f
-
SHA256
6e87d09fb03990385abd0c91d723a15472f7775799a2410c339a536e140074fa
-
SHA512
fd5f69cd4fc56786a2cd9757a5f79da94e35955fa73a7645a9a71b36ac89d4675f3770dc02a873e4e644c2bbdfcd8303a5c5ef3bcd38a67800ebb4b1e7413f2c
-
SSDEEP
786432:hyUxd3agz6VRNlHkWLX2MW+l7jhvKo51/7x4l5rp:NvOVLlHk0X2MWk7jXTx4Lrp
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
6e87d09fb03990385abd0c91d723a15472f7775799a2410c339a536e140074fa.exepid process 212 6e87d09fb03990385abd0c91d723a15472f7775799a2410c339a536e140074fa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5b18dfaded8f6d2380fdfd8f6b6969211
SHA1969fa0e906240ab1123254feeb833c275626cf76
SHA256747d0222b652dbfc85e0de4f8486473662d325a55e32c7eacb91e53e37ceba58
SHA51225fb09b8657997d31e61c908f1cd08357c1a1b68bbb1ba377e87b6a3eb347a2ef96c1a771b6c4332853abb33728c55c83efa73df5da03f3dfc132f8a69a2886c