Analysis

  • max time kernel
    162s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 04:27

General

  • Target

    e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe

  • Size

    955KB

  • MD5

    fdfd34373b90cb7bd8f65d35294f2edf

  • SHA1

    dac578100922d1c54569173cb01d029cfa9c15ee

  • SHA256

    e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b

  • SHA512

    be43d14b305f68342872fcf947a7dd9b872062948903b5d3cef35f1e68c60696d9c86da1efeb34952d1b5b71d31ecdbd31fa20abf30f2dfe665b5fe1897d10eb

  • SSDEEP

    24576:bsvsbu3f2cYhygBuWdthAwnMd0snQrv9ORyOM:bsvso2vhxdLEfQrvkRd

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe
    "C:\Users\Admin\AppData\Local\Temp\e2e103f645e4a1f3a259db75d2d5c7a2df3f4c68a12a652e55289bb9eee0834b.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/744-132-0x0000000000400000-0x000000000077A000-memory.dmp

    Filesize

    3.5MB

  • memory/744-133-0x0000000000400000-0x000000000077A000-memory.dmp

    Filesize

    3.5MB