Analysis
-
max time kernel
88s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 12:44
Static task
static1
Behavioral task
behavioral1
Sample
63746bf220aca4d7ecb8fd74d4c594ebee8e7c6b6c9a5e8b5688fc716d04d2ee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
63746bf220aca4d7ecb8fd74d4c594ebee8e7c6b6c9a5e8b5688fc716d04d2ee.exe
Resource
win10v2004-20220901-en
General
-
Target
63746bf220aca4d7ecb8fd74d4c594ebee8e7c6b6c9a5e8b5688fc716d04d2ee.exe
-
Size
298KB
-
MD5
5d484bff05cffe86c2a6ff6dc0aed75b
-
SHA1
f960cbbabbc16ae532cc146d3de65288c07c9ba4
-
SHA256
63746bf220aca4d7ecb8fd74d4c594ebee8e7c6b6c9a5e8b5688fc716d04d2ee
-
SHA512
19f63e51d761d16d6a24de616d920258e9286b1f8cf47cdc46b7f53b9906eb5f7ba13842a66aef5e2d04ae71db1bf959017ab18215ad1bcf6a950bf3af70aafd
-
SSDEEP
6144:Oj5Iiqvn3Flcu0XRDsYxSGmjfMuAuhDte1goipY6Z2WL3H1mr61FJ9Eye+FBlL:Qu7f3Flc1mYxSGmYuAwhL/Yo2WL3Vmr8
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\63746bf220aca4d7ecb8fd74d4c594ebee8e7c6b6c9a5e8b5688fc716d04d2ee.lnk 63746bf220aca4d7ecb8fd74d4c594ebee8e7c6b6c9a5e8b5688fc716d04d2ee.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\Bidaily Synchronize Task.job 63746bf220aca4d7ecb8fd74d4c594ebee8e7c6b6c9a5e8b5688fc716d04d2ee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.