Analysis
-
max time kernel
159s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 15:08
Static task
static1
Behavioral task
behavioral1
Sample
e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09.exe
Resource
win10v2004-20221111-en
General
-
Target
e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09.exe
-
Size
369KB
-
MD5
7a9300409ddaef0505d19cda0c540f88
-
SHA1
35d2a57f0ebbe27f365b5f9157a34ad2cbd5ece4
-
SHA256
e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09
-
SHA512
8e6f20135ac714fefa162a12a6c1bbe0d68778ac5acd5d7e0beac284fbc2c210764aedbdb4e50a5c3f9060cdd6ea4d370d3063af20222fd3cfc73ddf34a02d58
-
SSDEEP
6144:0uy9TdQls6AAdJ2hIGpXRQZaagunLz4GdpFZ477Dno0vTOcHkUO:0LQC6AWe7Ig6K5lBO
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09.lnk e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.