Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 09:43
Static task
static1
Behavioral task
behavioral1
Sample
529b09ecf344d6e16240361bd74f165590726d3cf568a42657cff926de9499d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
529b09ecf344d6e16240361bd74f165590726d3cf568a42657cff926de9499d7.exe
Resource
win10v2004-20221111-en
General
-
Target
529b09ecf344d6e16240361bd74f165590726d3cf568a42657cff926de9499d7.exe
-
Size
633KB
-
MD5
551309e4c4ba98069c81c96802a19070
-
SHA1
dbd9f154eeb510918e0c7cd4bff014561a87c557
-
SHA256
529b09ecf344d6e16240361bd74f165590726d3cf568a42657cff926de9499d7
-
SHA512
3dd0586172a0573029f405a4c1a0f7cf2f287455c12d97a9ca867c56fe7f423d5f19b011a5d7a92b1a653e2023545db9f879495f3c8ae0d54a4bf359e174e1fd
-
SSDEEP
12288:puudoYcGL//JWM01Vfby4QQvRO4mqPeQ9HXD4AQfxAwyNa7HyQKkXl:pueoYT/hmflRBmqPeQ93D4AQtHFB1
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1324 529b09ecf344d6e16240361bd74f165590726d3cf568a42657cff926de9499d7.exe