Analysis
-
max time kernel
203s -
max time network
224s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe
Resource
win10v2004-20221111-en
General
-
Target
820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe
-
Size
920KB
-
MD5
da7d7c30500ae2a6d5036da5b6b8a822
-
SHA1
e898b91a63a9c48c1988eaa05ccb5221d96888ad
-
SHA256
820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946
-
SHA512
db1fa7652f55b0ddb4bcd2b00b9f1361a74a68823080edce73d6ecdb1a3e69633039a3b309eb915011fc72bb8adef765e0e67806d319cb0fbdbd1bac30d1de7b
-
SSDEEP
6144:SZQjh5WC+xiarOOBW5HqdC27Ml2E5UWTITeCE8tTN28ZjwdKa0341n6UNP5P4E6P:LrWC+xia6/5rQ2efZTNlahQI4+M
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4164 820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe 4164 820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe 4164 820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4164 wrote to memory of 3276 4164 820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe 82 PID 4164 wrote to memory of 3276 4164 820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe 82 PID 4164 wrote to memory of 3276 4164 820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe"C:\Users\Admin\AppData\Local\Temp\820f63a47e86fe10a784b8a2acc4035fd306c718abc4a04d2330cee748a0d946.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\KK.png2⤵PID:3276
-