Analysis

  • max time kernel
    90s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 04:05

General

  • Target

    abeb68258e3c5921de2061138879720b2c887ddaf1d7ecd65357926b1e92f7dd.exe

  • Size

    2.2MB

  • MD5

    af57013ed409efb51244d2631934e2ea

  • SHA1

    c9b426f683da04772b0e91cc4ff54d95bf48a909

  • SHA256

    abeb68258e3c5921de2061138879720b2c887ddaf1d7ecd65357926b1e92f7dd

  • SHA512

    12350a54a4a54244a7d9ab6514bf7e32b13f373d909c190e11e1f4d680b33b5b9c7eba03d79f39424001096d902a9264b73c5521c4e28f3ad8537e14bd010f91

  • SSDEEP

    49152:7JKrinlUS/oJmFFNptj7TnPdU585nqpGPCY0dxGrL21PAjGoe9Hec:VW8To4ppF7TPj5qYJd2V6Goe9Hl

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\abeb68258e3c5921de2061138879720b2c887ddaf1d7ecd65357926b1e92f7dd.exe
    "C:\Users\Admin\AppData\Local\Temp\abeb68258e3c5921de2061138879720b2c887ddaf1d7ecd65357926b1e92f7dd.exe"
    1⤵
    • Drops file in Program Files directory
    PID:644

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads