Analysis
-
max time kernel
26s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
95f14a07aa55ff815bdf1d3b9acfb02f33d8bffcac2945710ef93ce28e6625b7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
95f14a07aa55ff815bdf1d3b9acfb02f33d8bffcac2945710ef93ce28e6625b7.exe
Resource
win10v2004-20220812-en
General
-
Target
95f14a07aa55ff815bdf1d3b9acfb02f33d8bffcac2945710ef93ce28e6625b7.exe
-
Size
822KB
-
MD5
44e320e71a69938a8d55aa2ffa40056f
-
SHA1
d8cdbdbf8e0e4fe8109b96e104e0666e8d9b3654
-
SHA256
95f14a07aa55ff815bdf1d3b9acfb02f33d8bffcac2945710ef93ce28e6625b7
-
SHA512
a947f0ac7abcd3fd04b9e7ec86dd784fa11fac2843eb23ca06f2078b366e38cff5bc036a5d8f7e8f635133b5db5a369856f685c814946a2c28b017f5d0990a7f
-
SSDEEP
12288:9DuuddOz/jvPAcHtbL2uzpazN3uaLQLM7zil8l8InCAr1k5kBQ8ZvzVHA/72lr6c:RueUr8cNbpzwB+a0LMSECKkWOAvzCYN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 95f14a07aa55ff815bdf1d3b9acfb02f33d8bffcac2945710ef93ce28e6625b7.exe