Analysis
-
max time kernel
282s -
max time network
316s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
6a39209e89e0cbba8fd932e5a05a1264a69572de90ee7e0e3e495f507a97e767.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a39209e89e0cbba8fd932e5a05a1264a69572de90ee7e0e3e495f507a97e767.exe
Resource
win10v2004-20221111-en
General
-
Target
6a39209e89e0cbba8fd932e5a05a1264a69572de90ee7e0e3e495f507a97e767.exe
-
Size
104KB
-
MD5
1d60eb206bca7aef5ca3815cdee77dad
-
SHA1
871a022ef141dbdf2e667854f3dc26d57f4bd641
-
SHA256
6a39209e89e0cbba8fd932e5a05a1264a69572de90ee7e0e3e495f507a97e767
-
SHA512
1eeb094510fa4c1610e9f38a6fbac35b8a63244029a0f44c34a143b33ae27981c629a7902342b33136b1a35796bb66618edcd7a80c1133f0980581c9792e46bd
-
SSDEEP
3072:pVLxeqvcSVfv8PxZCmlTI2jGBi9RNdA2oTD5/j:pZxeqESVHSCtsWmRNOxX5/j
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\s.exe 6a39209e89e0cbba8fd932e5a05a1264a69572de90ee7e0e3e495f507a97e767.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3140 6a39209e89e0cbba8fd932e5a05a1264a69572de90ee7e0e3e495f507a97e767.exe