Analysis

  • max time kernel
    32s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/11/2022, 16:05

General

  • Target

    cf2c619e7b531ea7ed36c8de564b31733b9d88d507a53332006d8d272321d470.exe

  • Size

    356KB

  • MD5

    2011ff7922fef1768b5833cfabcab455

  • SHA1

    aa4d7f4dc8420a75d4a135b0a254b9070659fec8

  • SHA256

    cf2c619e7b531ea7ed36c8de564b31733b9d88d507a53332006d8d272321d470

  • SHA512

    2e8974f254fc34e1a2742ca75b25e150202d659a895dbc864e74335bb2b34f6efd86813e1ec5c5e6305c2e56a4447c949060d5a0ad3c8f8baf9d12ea217cfb23

  • SSDEEP

    6144:/YhE8RiarpiWVUemikRB4j039fQZGlmsPR5E5uxga0FjWFYJsIl:whE8RiyEWSeIuZGlmsPI5j9sc

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf2c619e7b531ea7ed36c8de564b31733b9d88d507a53332006d8d272321d470.exe
    "C:\Users\Admin\AppData\Local\Temp\cf2c619e7b531ea7ed36c8de564b31733b9d88d507a53332006d8d272321d470.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1584

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1584-54-0x0000000074BB1000-0x0000000074BB3000-memory.dmp

          Filesize

          8KB