Analysis
-
max time kernel
21s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 09:32
Static task
static1
Behavioral task
behavioral1
Sample
6aad08de1b891e7fbb0490e85a43a760c54e448a1c896ebf6f1a7775198a5a44.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6aad08de1b891e7fbb0490e85a43a760c54e448a1c896ebf6f1a7775198a5a44.exe
Resource
win10v2004-20221111-en
General
-
Target
6aad08de1b891e7fbb0490e85a43a760c54e448a1c896ebf6f1a7775198a5a44.exe
-
Size
731KB
-
MD5
82342829049d73cb978840b0471086a9
-
SHA1
970d63f69a7669aa5d728b09f6e823758b5fe6d0
-
SHA256
6aad08de1b891e7fbb0490e85a43a760c54e448a1c896ebf6f1a7775198a5a44
-
SHA512
2c10f01c2f75c4ed7b03a85fbad511b32821b38301df66631f06a281f30b5ff57b3443a6e5bede33a3d6602fdadced2d7c88244cc3b58fb2957634d8fa573684
-
SSDEEP
12288:xuudeYcGL//JWM01Vfby4QQvRO4mqPeQ9HXD4AQfP7NXy0mQR8Y5N9OQtMHi:xueeYT/hmflRBmqPeQ93D4AQXBC0V5si
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 6aad08de1b891e7fbb0490e85a43a760c54e448a1c896ebf6f1a7775198a5a44.exe