Analysis
-
max time kernel
36s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
a3b7c97822f97209dccb253a03cd001de7e4b1a79253686eaa4ef76ec48780b2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3b7c97822f97209dccb253a03cd001de7e4b1a79253686eaa4ef76ec48780b2.exe
Resource
win10v2004-20220901-en
General
-
Target
a3b7c97822f97209dccb253a03cd001de7e4b1a79253686eaa4ef76ec48780b2.exe
-
Size
564KB
-
MD5
d83f597862675f5f1daa18fd0a1efa56
-
SHA1
315aa0888466e204ef434f7f1e55e46897f17336
-
SHA256
a3b7c97822f97209dccb253a03cd001de7e4b1a79253686eaa4ef76ec48780b2
-
SHA512
cfbd0d7b09ba69253f46260ccf5f05ed7177890133ff2b4022293a033583019ce74a5bcd151fa7801f728da717714b2846871553792700d9e9c66b9dbda0ff07
-
SSDEEP
12288:vGQlIdQ8lIglrNYlPGAHQlmKgGRPcIxWcOAH:v/IdQ8KglrNYltim/GRJx8AH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1736 a3b7c97822f97209dccb253a03cd001de7e4b1a79253686eaa4ef76ec48780b2.exe