Analysis
-
max time kernel
84s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 14:10
Static task
static1
Behavioral task
behavioral1
Sample
c101081c41c3f9fcde64b45a086c80509ccab7b09078c92e044a6e7d45e7f628.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c101081c41c3f9fcde64b45a086c80509ccab7b09078c92e044a6e7d45e7f628.exe
Resource
win10v2004-20220901-en
General
-
Target
c101081c41c3f9fcde64b45a086c80509ccab7b09078c92e044a6e7d45e7f628.exe
-
Size
370KB
-
MD5
34215dae0c159bd256ee7e832e885727
-
SHA1
4243d78de97518b5af109a46e53d9576747c7198
-
SHA256
c101081c41c3f9fcde64b45a086c80509ccab7b09078c92e044a6e7d45e7f628
-
SHA512
cba4f3afbcc1fa921e8c94409829a9639a1d66fe658e2e4ba28ca0f995f4f589b12ef8c173dc36d1d4e91445d46ad11189e6381cb98566ea35dd91815f7f823d
-
SSDEEP
6144:GFus5e7YzFGitSoR0sBZc0g2RBKaByGFcQIRcEpPib/sjVWC1FfY/gNgsE:YusEY1tSoisjRvBytQ6FPNgsE
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\c101081c41c3f9fcde64b45a086c80509ccab7b09078c92e044a6e7d45e7f628.lnk c101081c41c3f9fcde64b45a086c80509ccab7b09078c92e044a6e7d45e7f628.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.