Analysis
-
max time kernel
2s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
63e03d1732dd797c4a2ebe7064e1bee2f8f401bed59a597a90d340996703aa1e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
63e03d1732dd797c4a2ebe7064e1bee2f8f401bed59a597a90d340996703aa1e.exe
Resource
win10v2004-20221111-en
General
-
Target
63e03d1732dd797c4a2ebe7064e1bee2f8f401bed59a597a90d340996703aa1e.exe
-
Size
829KB
-
MD5
22e849c32ce805dc2cb77aab897918f1
-
SHA1
67565eabb6db80dadbd5b6b1afe2073df3d4df4d
-
SHA256
63e03d1732dd797c4a2ebe7064e1bee2f8f401bed59a597a90d340996703aa1e
-
SHA512
4982904e243c1ae7a8a491a54bfc309c40cf9d260d83704280a351ba44e24fdd7ec136c3cad059751ec273f339f53b66eac7f2a93b30944025a771d7b810664f
-
SSDEEP
12288:cDuud8z/jvPAcHtbL2uzpazN3uaLMDx5x59SH5PM/JMSluaGkJ0KULWV2y8:Que8r8cNbpzwB+aQDx5gHMluafV8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1228 63e03d1732dd797c4a2ebe7064e1bee2f8f401bed59a597a90d340996703aa1e.exe