Analysis
-
max time kernel
162s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 04:27
Behavioral task
behavioral1
Sample
e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe
Resource
win10v2004-20221111-en
General
-
Target
e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe
-
Size
955KB
-
MD5
fdfd34373b90cb7bd8f65d35294f2edf
-
SHA1
dac578100922d1c54569173cb01d029cfa9c15ee
-
SHA256
e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b
-
SHA512
be43d14b305f68342872fcf947a7dd9b872062948903b5d3cef35f1e68c60696d9c86da1efeb34952d1b5b71d31ecdbd31fa20abf30f2dfe665b5fe1897d10eb
-
SSDEEP
24576:bsvsbu3f2cYhygBuWdthAwnMd0snQrv9ORyOM:bsvso2vhxdLEfQrvkRd
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/744-132-0x0000000000400000-0x000000000077A000-memory.dmp upx behavioral2/memory/744-133-0x0000000000400000-0x000000000077A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 744 e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe 744 e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe 744 e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe