Analysis

  • max time kernel
    188s
  • max time network
    231s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/11/2022, 09:20

General

  • Target

    8aaba992bc60420d2b7eae6522da1b2e45885ff3d64422c68516f0b1f5bd95ab.exe

  • Size

    831KB

  • MD5

    ed38bc999ac0dbac738311c2bca883ac

  • SHA1

    82f863d467f6e56098c0d559e5df6c5116804f6d

  • SHA256

    8aaba992bc60420d2b7eae6522da1b2e45885ff3d64422c68516f0b1f5bd95ab

  • SHA512

    6f42e45cd9c5acbd2b0fcef8b613c16fb48937db1f4969729379b3df379355038475ea3255e53e6aea1119d2bf077b6c0d59b45e465ffb21f388def284ed4249

  • SSDEEP

    12288:2quuJcz/jvPAcHtbL2uzpazN3uaL3hJx/D311ULEWIKWc2a7:buicr8cNbpzwB+arhJx/D33l0XD7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8aaba992bc60420d2b7eae6522da1b2e45885ff3d64422c68516f0b1f5bd95ab.exe
    "C:\Users\Admin\AppData\Local\Temp\8aaba992bc60420d2b7eae6522da1b2e45885ff3d64422c68516f0b1f5bd95ab.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:4472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads