Analysis
-
max time kernel
112s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 10:02
Static task
static1
Behavioral task
behavioral1
Sample
084598013570cd5ed2836164fb4ee6f54b17f5427e689fa8605fb1a542802353.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
084598013570cd5ed2836164fb4ee6f54b17f5427e689fa8605fb1a542802353.exe
Resource
win10v2004-20220812-en
General
-
Target
084598013570cd5ed2836164fb4ee6f54b17f5427e689fa8605fb1a542802353.exe
-
Size
831KB
-
MD5
e98b815770fff6b1a1a29faef5826911
-
SHA1
225d9554922734814116253eb30c0ec0accc178c
-
SHA256
084598013570cd5ed2836164fb4ee6f54b17f5427e689fa8605fb1a542802353
-
SHA512
c8179a11de6bcd0239862ecaaf2c0f3402f825c8b4f41f3a8d269eb67a9fea538958f6e432b0e7e69e6793e0d7b13a832ef3eca08899581eebf8ca1db5021cd9
-
SSDEEP
12288:DquuJcz/jvPAcHtbL2uzpazN3uaL3hJx/D311ULEWIKWc2aK:muicr8cNbpzwB+arhJx/D33l0XDK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 084598013570cd5ed2836164fb4ee6f54b17f5427e689fa8605fb1a542802353.exe