Analysis

  • max time kernel
    159s
  • max time network
    178s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 15:08

General

  • Target

    e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09.exe

  • Size

    369KB

  • MD5

    7a9300409ddaef0505d19cda0c540f88

  • SHA1

    35d2a57f0ebbe27f365b5f9157a34ad2cbd5ece4

  • SHA256

    e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09

  • SHA512

    8e6f20135ac714fefa162a12a6c1bbe0d68778ac5acd5d7e0beac284fbc2c210764aedbdb4e50a5c3f9060cdd6ea4d370d3063af20222fd3cfc73ddf34a02d58

  • SSDEEP

    6144:0uy9TdQls6AAdJ2hIGpXRQZaagunLz4GdpFZ477Dno0vTOcHkUO:0LQC6AWe7Ig6K5lBO

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09.exe
    "C:\Users\Admin\AppData\Local\Temp\e050a6c975fe34083409c8c5641623fcc718ad96d2585bddb6a573b36b8fdf09.exe"
    1⤵
    • Drops startup file
    PID:2264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2264-132-0x00000000034C0000-0x00000000034EC000-memory.dmp

    Filesize

    176KB