Analysis
-
max time kernel
98s -
max time network
105s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 20:36
Static task
static1
Behavioral task
behavioral1
Sample
b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exe
Resource
win10v2004-20220812-en
General
-
Target
b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exe
-
Size
35KB
-
MD5
c0c347f3a4f578634d79aa8e7f614772
-
SHA1
6efbb01e88d6ba82f8635c0ced1407206838c01c
-
SHA256
b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3
-
SHA512
a3a0b775a75c9108e6dc76c433f315d44f2075455744bdba140d0584b16f21f1cd8936fba589f1bf276ccf697ceced92535dc8173f099518bb85a2cc9bd5aaf4
-
SSDEEP
768:UPRf/KRwPqF+q71LPhnpwY9VSTUPCMRnGF:UPRf/KRwPxq71LP590MRG
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chromium = "\"C:\\Program Files (x86)\\Google\\Update\\GoogleUpdate.exe\"" b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exe -
Drops file in Windows directory 3 IoCs
Processes:
b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exedescription ioc process File created C:\Windows\Interop.IWshRuntimeLibrary.dll b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exe File created C:\Windows\dwmvs.exe b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exe File created C:\Windows\tplmk.exe b265431f41e964b09900df890ebdb7a6d399d0edf76b0afb6664ec39117477f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.