Analysis

  • max time kernel
    188s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 03:20

General

  • Target

    72b87297805726f9f221c36d46104dea3188f6ac83c5f148f0c23e97887badad.exe

  • Size

    31KB

  • MD5

    7453790fc6a52520db6065218e80e3b0

  • SHA1

    31223473a8e57211b6f6622f182011bfa023feff

  • SHA256

    72b87297805726f9f221c36d46104dea3188f6ac83c5f148f0c23e97887badad

  • SHA512

    4327af2b318a7a9615fda6a071a6ee3c7d7d322f37859fcca659c0dc33c342be2e5e567575ac5a33466815960427bbfb6daafde6796039d829e6170d18f1d379

  • SSDEEP

    768:VKStqusJ0GQl5BePGXvIf2KamGiwTUEs9UPRwL4ihxKgdOgvil:PtqusJ0GQl5n/I/xtwTUEs9UParKgdOd

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\72b87297805726f9f221c36d46104dea3188f6ac83c5f148f0c23e97887badad.exe
    "C:\Users\Admin\AppData\Local\Temp\72b87297805726f9f221c36d46104dea3188f6ac83c5f148f0c23e97887badad.exe"
    1⤵
    • Enumerates connected drives
    PID:1084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1084-54-0x0000000076401000-0x0000000076403000-memory.dmp

    Filesize

    8KB