Analysis
-
max time kernel
34s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 16:57
Static task
static1
Behavioral task
behavioral1
Sample
1a48e715a9b546d7de074fef1a444a31c5b2c1008dcae50d4136afb4a676a986.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a48e715a9b546d7de074fef1a444a31c5b2c1008dcae50d4136afb4a676a986.exe
Resource
win10v2004-20220812-en
General
-
Target
1a48e715a9b546d7de074fef1a444a31c5b2c1008dcae50d4136afb4a676a986.exe
-
Size
2.6MB
-
MD5
75ce83ae5129ecfe3d8a0c44d162d95e
-
SHA1
67d3dd2b07426633266e476b75e119c455dfadb4
-
SHA256
1a48e715a9b546d7de074fef1a444a31c5b2c1008dcae50d4136afb4a676a986
-
SHA512
c95ac53b4e37d921810d8c23e61bed25b92fc2fced26145b576714d06ccb5b215d65de6baa16908fe3f841bfe708d61008e33efd05ce43b1e15dea866c3c61c1
-
SSDEEP
49152:eLnk/P+4FURc1AITu49lez4XmkjtG6ixjZi:eDk/WUOgAMf/X7jtKXi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1228-54-0x0000000076401000-0x0000000076403000-memory.dmpFilesize
8KB