Analysis

  • max time kernel
    187s
  • max time network
    213s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 15:09

General

  • Target

    00cf95e671bee96e3eb94cfe1bed17bc0bbb5de4739418a4134f96149418e40a.exe

  • Size

    362KB

  • MD5

    0d5b73b8f1e2781436c6e6bea66d477d

  • SHA1

    11a3a7c0dab5451dd11a06ff8f806758732082ff

  • SHA256

    00cf95e671bee96e3eb94cfe1bed17bc0bbb5de4739418a4134f96149418e40a

  • SHA512

    57d97ecdcec0de04327abbc5aee9e9ff2f053a3789995a4e269c44d5cce4e1b0d4eaf38331059088d88671c3ab50b0b40c605a279e5661fcfd62af87f156ab3c

  • SSDEEP

    6144:eAzJUYMu2wcUhEghWzIEJwwxLIHkK3hMXEzgdvr1fx:eYFn21UhERzIgwiMEKRMXF51fx

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\00cf95e671bee96e3eb94cfe1bed17bc0bbb5de4739418a4134f96149418e40a.exe
    "C:\Users\Admin\AppData\Local\Temp\00cf95e671bee96e3eb94cfe1bed17bc0bbb5de4739418a4134f96149418e40a.exe"
    1⤵
    • Drops startup file
    • Drops file in Windows directory
    PID:3688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3688-132-0x0000000001860000-0x000000000188F000-memory.dmp

    Filesize

    188KB