Analysis
-
max time kernel
31s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 00:01
Static task
static1
Behavioral task
behavioral1
Sample
23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe
Resource
win10v2004-20220812-en
General
-
Target
23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe
-
Size
42KB
-
MD5
a81b259141cc1852b42099773ee561ce
-
SHA1
2e9ecd67d496da5798481d8a77e8a17ae10d4161
-
SHA256
23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f
-
SHA512
1c07b5cff8bf606e31798ffa5e9dff1849920fb4f885f649e18e83f0b70db724022f9af8fbfde0d7819c7cc43311193417b5f3768b4e408a92d6afe1261fb54c
-
SSDEEP
384:CMnGbQgNEg+hOmoNTtTk0glTCp+fDWp9/ORV1ues2gXk3lkB+SCHGm3ZYWUZW:DAQvgeo1trglTu+SL/k1uesvikB3D
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\text/x-vcard\Extension = ".vcf" 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\ = "vCard File" 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\" /vcard %1" 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\shell\open\command 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file\DefaultIcon\ = "\"C:\\Program Files (x86)\\Windows Mail\\wab.exe\",1" 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.wab 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\ = "vcard_wab_auto_file" 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vcf\Content Type = "text/x-vcard" 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\vcard_wab_auto_file 23eee09b58c6886294c5f5cb43f8fd56be297146403d404706af06a8eec26e4f.exe