Analysis

  • max time kernel
    140s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 15:04

General

  • Target

    f2f899904fc5fa014a19cb472979ffb09581ea9263a68c66ce7fb774c818b041.exe

  • Size

    298KB

  • MD5

    b99c4276ebc7e6cc888b1936ee6ce81e

  • SHA1

    25dcf682371043f4c5660f6adfa9f6a1d3d01f6c

  • SHA256

    f2f899904fc5fa014a19cb472979ffb09581ea9263a68c66ce7fb774c818b041

  • SHA512

    bf06ed3e09ab45748e45a1d660533a3914d1c970380fbaf7550fb5904afde47700fc41cb052743a4fdb52859c29c78e9a82c8abe64f64cf88b4488cfac5da142

  • SSDEEP

    6144:p0pygMH8W/TYaq39wlN617kpVRGEwTACyfszkVPuTuvL:pVZc0Fq39wK17k4pTAMzGNvL

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2f899904fc5fa014a19cb472979ffb09581ea9263a68c66ce7fb774c818b041.exe
    "C:\Users\Admin\AppData\Local\Temp\f2f899904fc5fa014a19cb472979ffb09581ea9263a68c66ce7fb774c818b041.exe"
    1⤵
    • Drops startup file
    • Drops file in Windows directory
    PID:3392

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3392-132-0x0000000004D40000-0x0000000004D6F000-memory.dmp

    Filesize

    188KB