Analysis
-
max time kernel
18s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 13:45
Static task
static1
Behavioral task
behavioral1
Sample
923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022.exe
Resource
win10v2004-20220812-en
General
-
Target
923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022.exe
-
Size
100KB
-
MD5
38665856d98a267bfa4cffc8f7f64fce
-
SHA1
c1979beb0a685eb5a1682327d991dae42014e66a
-
SHA256
923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022
-
SHA512
108a0111f15a90edc61013385f36eb783d32aacf2e9f6a307e50327320145f3975c4cb55be767a10b9a29781aaa75f47eb300b7cd9176796593ac83fdfb70bab
-
SSDEEP
1536:Ldb/vBxIdFlU0AfLhwNuIj7Aw6Rx4Romu/FNQ2MTbEv6wKCbrAW5mK/kPosC6+W:LnilMf+NuXw6Rx45LBzCbrAumK/kPo6
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1948 923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022.exe 1948 923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022.exe 1948 923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022.exe 1948 923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022.exe 1948 923490b5b6da0317ba7acad54da79b65ba26f6b2383c8cddde465b17416d0022.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD504ce2cd92b8415ae8d968a161358818f
SHA14e8d3fee5ad10573bc4060df445326ff6dd8abf8
SHA2563d298b29abe5c4a058bce547fec55664c90b153a552986e49de818149fe62410
SHA512250f27345eb79ea7b6ad299628d8870dcbde45a925172cca67baf3a07a537c3b8447792abf13a6681b95ba4414d691942ee298a045899b50d8bb5f4e121b5407
-
Filesize
76KB
MD504ce2cd92b8415ae8d968a161358818f
SHA14e8d3fee5ad10573bc4060df445326ff6dd8abf8
SHA2563d298b29abe5c4a058bce547fec55664c90b153a552986e49de818149fe62410
SHA512250f27345eb79ea7b6ad299628d8870dcbde45a925172cca67baf3a07a537c3b8447792abf13a6681b95ba4414d691942ee298a045899b50d8bb5f4e121b5407
-
Filesize
76KB
MD504ce2cd92b8415ae8d968a161358818f
SHA14e8d3fee5ad10573bc4060df445326ff6dd8abf8
SHA2563d298b29abe5c4a058bce547fec55664c90b153a552986e49de818149fe62410
SHA512250f27345eb79ea7b6ad299628d8870dcbde45a925172cca67baf3a07a537c3b8447792abf13a6681b95ba4414d691942ee298a045899b50d8bb5f4e121b5407
-
Filesize
8KB
MD5a7d710e78711d5ab90e4792763241754
SHA1f31cecd926c5d497aba163a17b75975ec34beb13
SHA2569b05dd603f13c196f3f21c43f48834208fed2294f7090fcd1334931014611fb2
SHA512f0ca2d6f9a8aeac84ef8b051154a041adffc46e3e9aced142e9c7bf5f7272b047e1db421d38cb2d9182d7442bee3dd806618b019ec042a23ae0e71671d2943c0
-
Filesize
10KB
MD538977533750fe69979b2c2ac801f96e6
SHA174643c30cda909e649722ed0c7f267903558e92a
SHA256b4a95a455e53372c59f91bc1b5fb9e5c8e4a10a506fa04aaf7be27048b30ae35
SHA512e17069395ad4a17e24f7cd3c532670d40244bd5ae3887c82e3b2e4a68c250cd55e2d8b329d6ff0e2d758955ab7470534e6307779e49fe331c1fd2242ea73fd53