Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:06
Behavioral task
behavioral1
Sample
4cc5e2db8ba5c8fcdbe0083d1891a6b18ce490698ce43be828435b7620548dac.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4cc5e2db8ba5c8fcdbe0083d1891a6b18ce490698ce43be828435b7620548dac.exe
Resource
win10v2004-20220812-en
General
-
Target
4cc5e2db8ba5c8fcdbe0083d1891a6b18ce490698ce43be828435b7620548dac.exe
-
Size
447KB
-
MD5
1ed9abe99f90bd5ed3e3a816ced33903
-
SHA1
ed5bb934790ed994912b65a895d20402b4fc86c6
-
SHA256
4cc5e2db8ba5c8fcdbe0083d1891a6b18ce490698ce43be828435b7620548dac
-
SHA512
39a611f6ebd83c9cd7d3d2e0630b74c186a4cae52aaef1b58722dd306c4a253e333ba16b3104faf0d4e8bde08e8109a6f32f310dcd3d3612ccd3fb046dc79f60
-
SSDEEP
6144:yo0XjJgmx9jfumGiKW+s+9H/WdLb9lJ9uEji0s5hmylPdiloD:ybGHJDfuX939uewlVile
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1652-55-0x0000000001000000-0x0000000001098000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.