Analysis
-
max time kernel
431s -
max time network
488s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe
Resource
win10v2004-20221111-en
General
-
Target
a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe
-
Size
180KB
-
MD5
cd6a000e663489f6a977e57fc50d8c28
-
SHA1
7240b6348a00e1f45757d3b36475634a03d69e95
-
SHA256
a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150
-
SHA512
08342125d441bbff4c4fe65aed51a69de8eaceb90e67225a6818f3fbda060d5259221c16f4ec553637f14e280783b65831c5dcba3d9637b3018222ed49849bc7
-
SSDEEP
3072:YBAp5XhKpN4eOyVTGfhEClj8jTk+0hW3iRyC/xu6zS91Oja1:PbXE9OiTGfhEClq9P3K/Q6zPja1
Malware Config
Signatures
-
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\moskaraskakokokoko.hiq a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe File opened for modification C:\Program Files (x86)\v storonu\E230\10\EcuadoryGalapagos.bat a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\Latesttraveladvicefor.vbs a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe File opened for modification C:\Program Files (x86)\v storonu\E230\ultar\Simplyenteryouremailaddress.vbs a3d01c9edadb15296d0311fc037807a8aff1f83620e3bdf3411a73a1b6e7b150.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.