Analysis
-
max time kernel
154s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 09:15
Static task
static1
Behavioral task
behavioral1
Sample
9e007acd8bb84c907f88944b8814ed598bf766fcdc43322a09bc0909b0725944.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9e007acd8bb84c907f88944b8814ed598bf766fcdc43322a09bc0909b0725944.exe
Resource
win10v2004-20220812-en
General
-
Target
9e007acd8bb84c907f88944b8814ed598bf766fcdc43322a09bc0909b0725944.exe
-
Size
829KB
-
MD5
12348d3022cef001ffae5532971fc152
-
SHA1
33fddc93bb0e48ccc69957c9b3434e01c56c199c
-
SHA256
9e007acd8bb84c907f88944b8814ed598bf766fcdc43322a09bc0909b0725944
-
SHA512
dc5bfc458d50a1b01b5f07b30ed8ae8e192949553001d8249b558e291d8d47b7ed7117038b19f17fc8c3913bb776a93d587fa17efbe0003e7ceb77485fef6f7c
-
SSDEEP
12288:pDuud8z/jvPAcHtbL2uzpazN3uaLMDx5x59SH5PM/JMSluaGkJ0KULWV2h:tue8r8cNbpzwB+aQDx5gHMluafV4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4032 9e007acd8bb84c907f88944b8814ed598bf766fcdc43322a09bc0909b0725944.exe