Analysis

  • max time kernel
    178s
  • max time network
    224s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 09:05

General

  • Target

    c1a63ac3f1bcd0d874bf0a587a71bfec6a55c2c30b756441a6ca2e12785500bd.exe

  • Size

    638KB

  • MD5

    a6c775becef7748c79ce2309e1822ad1

  • SHA1

    2c6273717acffc121b5d7b4c740152ccc51c9229

  • SHA256

    c1a63ac3f1bcd0d874bf0a587a71bfec6a55c2c30b756441a6ca2e12785500bd

  • SHA512

    4e789735ede7278456d32568711c4465ffb92fc4336c6f663bbc088271fff60eb63b656e2cf22cb4dc43230137d848fd421d6065deb1219d192d74c02a6e289b

  • SSDEEP

    12288:8uudWYcGL//JWM01Vfby4QQvRO4mqPeQ9HXD4AQfy3pxp7JExG4MuMMT+MpA:8ueWYT/hmflRBmqPeQ93D4AQq3vNJuGH

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1a63ac3f1bcd0d874bf0a587a71bfec6a55c2c30b756441a6ca2e12785500bd.exe
    "C:\Users\Admin\AppData\Local\Temp\c1a63ac3f1bcd0d874bf0a587a71bfec6a55c2c30b756441a6ca2e12785500bd.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:4900

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads