Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 09:13
Static task
static1
Behavioral task
behavioral1
Sample
a6976c5addd6fea5e809f737874e90a87dbb7e419d8b8279d9d4f83694ebd227.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6976c5addd6fea5e809f737874e90a87dbb7e419d8b8279d9d4f83694ebd227.exe
Resource
win10v2004-20220901-en
General
-
Target
a6976c5addd6fea5e809f737874e90a87dbb7e419d8b8279d9d4f83694ebd227.exe
-
Size
831KB
-
MD5
4335b2b3252836dd52fd78892a818885
-
SHA1
8d25928c45f14a29303039f09da6b1af17a4cea8
-
SHA256
a6976c5addd6fea5e809f737874e90a87dbb7e419d8b8279d9d4f83694ebd227
-
SHA512
319d1820296f831bd48d7270247d024854fe6cc43611afa28abc01ba62af2fd33939205c06b95a136753a2c22ccaf838552bfbcb32e2e669b84efa97b67596e0
-
SSDEEP
12288:+quuJcz/jvPAcHtbL2uzpazN3uaL3hJx/D311ULEWIKWc2aaj:Duicr8cNbpzwB+arhJx/D33l0XDu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1196 a6976c5addd6fea5e809f737874e90a87dbb7e419d8b8279d9d4f83694ebd227.exe