Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 08:53
Static task
static1
Behavioral task
behavioral1
Sample
f7074501d9e0071a25c3d9d9aa58c86147d9136034d3e4571db46012478565eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f7074501d9e0071a25c3d9d9aa58c86147d9136034d3e4571db46012478565eb.exe
Resource
win10v2004-20220812-en
General
-
Target
f7074501d9e0071a25c3d9d9aa58c86147d9136034d3e4571db46012478565eb.exe
-
Size
562KB
-
MD5
da09198f9ab688c0c8f1d779ab40d3b0
-
SHA1
28a08bc8de31036ca68120817fb2b4194c864970
-
SHA256
f7074501d9e0071a25c3d9d9aa58c86147d9136034d3e4571db46012478565eb
-
SHA512
c8dd18f45bb4ff37e72e6b5f56157e66b9acc1d3df191d11a1cbaf0b0373fc5b648b376848aa968a9e3186c1f6932bdc29dacf30d4cc414e8d92fafbffed2192
-
SSDEEP
12288:TCK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMF4:TChqKgU79usbkx+VNJhofz765h6
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 f7074501d9e0071a25c3d9d9aa58c86147d9136034d3e4571db46012478565eb.exe