Analysis
-
max time kernel
131s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 20:36
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Contract Country Residential Purchase Contract.pdf
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Purchase Contract Country Residential Purchase Contract.pdf
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
data.json
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
data.json
Resource
win10v2004-20220812-en
General
-
Target
data.json
-
Size
5KB
-
MD5
ff487e97599b7040b0030465c270d74f
-
SHA1
0c0794b2af7325f07dac8f665a3195748675cc10
-
SHA256
6cec0424bad0943cad9785984edd4a36b8237b7bc06abd3748c659dc0f302700
-
SHA512
bcac4d625f93865a755c6a8bc1a625ca0a684630006fc17da3acd83e1a8fd79e4d80bbaad51a7ad81260330a7a130b09e00ddba0f9c49eb27e8ba2b313c40819
-
SSDEEP
96:jYP9KJJXkdYU+lbEHgKHqeMEgESd5VIq0+M8YLCpcyJtfYUAlpU5f:jwiudYU+lbgHEPi+7uCp17jAlC5f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3836 OpenWith.exe