Analysis

  • max time kernel
    34s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 06:41

General

  • Target

    4563cb41a551c8eee5d57b59e4231e0456bccb90c15b40b3570a13b826f3fb8c.exe

  • Size

    485KB

  • MD5

    a2b394003eedbb189ca5ece341aa47e2

  • SHA1

    2e44e84c8cf3c69bfe110e2e04cd31f3fd59902c

  • SHA256

    4563cb41a551c8eee5d57b59e4231e0456bccb90c15b40b3570a13b826f3fb8c

  • SHA512

    b7c291c62ad4fa738269147eb37f20632d48f40e680a2e9f7596e34ce22787e0cda774fb708d0a4bc966dba2bd279546f7b876bb96d83d4e8f9f1fe91aaa1700

  • SSDEEP

    12288:lLFU2oitpf5hCPFZYdfUU6Bi/TDm3c9XqIFV:l2ztZYRU2L4c9lFV

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4563cb41a551c8eee5d57b59e4231e0456bccb90c15b40b3570a13b826f3fb8c.exe
    "C:\Users\Admin\AppData\Local\Temp\4563cb41a551c8eee5d57b59e4231e0456bccb90c15b40b3570a13b826f3fb8c.exe"
    1⤵
    • Modifies registry class
    • NTFS ADS
    • Suspicious use of SetWindowsHookEx
    PID:1452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1452-54-0x0000000075041000-0x0000000075043000-memory.dmp

    Filesize

    8KB

  • memory/1452-55-0x0000000000380000-0x0000000000475000-memory.dmp

    Filesize

    980KB

  • memory/1452-56-0x0000000000380000-0x0000000000475000-memory.dmp

    Filesize

    980KB

  • memory/1452-57-0x0000000000380000-0x0000000000475000-memory.dmp

    Filesize

    980KB