Analysis

  • max time kernel
    144s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 18:37

General

  • Target

    1b7c6f46b7e3344bd552ee4eb56e81afae388ff0160d5ac6e85bb449f6fb63cd.exe

  • Size

    379KB

  • MD5

    86b86c98690502942591e1aa0563f74a

  • SHA1

    fd03dbda268ff507b9a867a710865ddc29684046

  • SHA256

    1b7c6f46b7e3344bd552ee4eb56e81afae388ff0160d5ac6e85bb449f6fb63cd

  • SHA512

    0c53046c1fdbcc937369f3b83964a868679d4366f0a761332ba31ed8121edd91454c70ed4dcd255a6ca7c0c797ef7b99ddb60bdea45a5480753dc51b40de65da

  • SSDEEP

    6144:4NClm/zV7vDmhBu9HdUjOgfzND84H3zkVi2i4icOP/AeOwq8zX6XnPG/87Cmqb:MF6hBu9HdIOQRzp2i4icrumqb

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b7c6f46b7e3344bd552ee4eb56e81afae388ff0160d5ac6e85bb449f6fb63cd.exe
    "C:\Users\Admin\AppData\Local\Temp\1b7c6f46b7e3344bd552ee4eb56e81afae388ff0160d5ac6e85bb449f6fb63cd.exe"
    1⤵
    • Drops startup file
    • Drops file in Windows directory
    PID:3044

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3044-132-0x0000000003C90000-0x0000000003CBF000-memory.dmp

          Filesize

          188KB