Analysis
-
max time kernel
200s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 11:44
Behavioral task
behavioral1
Sample
61b6f42cd86b11b448efd4cff966332c0c4d3ca9183fcf3ceb1fe3adcb3ea428.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
61b6f42cd86b11b448efd4cff966332c0c4d3ca9183fcf3ceb1fe3adcb3ea428.exe
Resource
win10v2004-20221111-en
General
-
Target
61b6f42cd86b11b448efd4cff966332c0c4d3ca9183fcf3ceb1fe3adcb3ea428.exe
-
Size
18KB
-
MD5
af66bb1ef7755009320b1c33510ebddc
-
SHA1
adda13254deb09fb110550c4df0d641ac361e593
-
SHA256
61b6f42cd86b11b448efd4cff966332c0c4d3ca9183fcf3ceb1fe3adcb3ea428
-
SHA512
fcf2b01bd813f4930dfd0bd913cb09a67fd0bda6379a5fc8fdb91946019339230da35ffc6589a54940ebe9fbefeb15237841f0559e8adcbe92ba906ea2641b48
-
SSDEEP
384:ARdCy1MqlWM4mQ2eJlSFuKZNExpmXBaODn:kCyCqlP4mQ/Dsu88Or
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.