Analysis
-
max time kernel
161s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 15:02
Static task
static1
Behavioral task
behavioral1
Sample
Tokens.sk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Tokens.sk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Tokens.sk
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral4
Sample
Tokens.sk
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral5
Sample
Tokens.sk
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral6
Sample
Tokens.sk
Resource
debian9-mipsel-en-20211208
General
-
Target
Tokens.sk
-
Size
4KB
-
MD5
fa656d935cc584d8c37a50f9b8b0686f
-
SHA1
e1fd90cff910c009fce81612470022b1b6ec9b7b
-
SHA256
4cf4deaeba3985a478d520beb1e9d7ec42d7b332bfbe90513d207c894a0bad43
-
SHA512
0d803c762a8aa0d4bdc58085cc9a21bb2d09d71f9b94f19b041335f555ea50ca04c0b83c993a4942e3bf5a6591b7457e78ced2751dce6c6cb85c83111d875f15
-
SSDEEP
96:1RjqLAkUc26FUm5xG/He4zH+03AOGwIoe7hlqsz:1QbUaUm5xGvewH+03AOGwIoe7hlqsz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3940 OpenWith.exe