Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
193b1ed14b5299de7e2b938038d2ddda0097df730cbd547b769c769db36b1e17.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
193b1ed14b5299de7e2b938038d2ddda0097df730cbd547b769c769db36b1e17.exe
Resource
win10v2004-20221111-en
General
-
Target
193b1ed14b5299de7e2b938038d2ddda0097df730cbd547b769c769db36b1e17.exe
-
Size
831KB
-
MD5
d155c7b360e43caaf06b7e6827a57633
-
SHA1
8e6853cbcdf759b36a94a35eb9f356a915003d6b
-
SHA256
193b1ed14b5299de7e2b938038d2ddda0097df730cbd547b769c769db36b1e17
-
SHA512
f171d2a389481e7380229c5aecb9e558c76685a6555ad2e634df0f1df8d20abcbd35f31dc21ccdd516446998642013ebc5fafc20c4a0a4e12fbba67325872ff2
-
SSDEEP
12288:+quuJcz/jvPAcHtbL2uzpazN3uaL3hJx/D311ULEWIKWc2a0b:Duicr8cNbpzwB+arhJx/D33l0XDg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1712 193b1ed14b5299de7e2b938038d2ddda0097df730cbd547b769c769db36b1e17.exe