Analysis
-
max time kernel
47s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 09:49
Static task
static1
Behavioral task
behavioral1
Sample
3ecd65153671ec329601effa0f403be4cfc9373d5f28620f1791132416b9f6d8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3ecd65153671ec329601effa0f403be4cfc9373d5f28620f1791132416b9f6d8.exe
Resource
win10v2004-20221111-en
General
-
Target
3ecd65153671ec329601effa0f403be4cfc9373d5f28620f1791132416b9f6d8.exe
-
Size
637KB
-
MD5
57ddb3bce5375908cc59b9b57a7fd0b8
-
SHA1
d8160194d390c6955191cbbdcfae59b3a60d7938
-
SHA256
3ecd65153671ec329601effa0f403be4cfc9373d5f28620f1791132416b9f6d8
-
SHA512
3ac3cedd76bb5886c7ef52013df8e1a738df852f002a1ae3c7009a888760ed58c652cd4dde80bbdec6c896ce03b590564b5e1f5e75e352c07ff7a7f1f4a15c2e
-
SSDEEP
12288:SuudlYcGL//JWM01Vfby4QQvRO4mqPeQ9HXD4AQfNGuzJI9I6d4Yp6Le:SuelYT/hmflRBmqPeQ93D4AQ1GuCOo4U
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1416 3ecd65153671ec329601effa0f403be4cfc9373d5f28620f1791132416b9f6d8.exe