Analysis
-
max time kernel
183s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 16:46
Behavioral task
behavioral1
Sample
7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe
Resource
win10v2004-20220812-en
General
-
Target
7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe
-
Size
5.9MB
-
MD5
84215ad0034c3eaea6c319dd4db72ef3
-
SHA1
736ab3f796fa0faff6e9703498df7428e5eb3bbd
-
SHA256
7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84
-
SHA512
87e9866a54159a51ad640bf693a19ea4fa52d2d96a443aad6f104ac4b8b232e594ee99f7e86311260300576ac714e78ddddba921335f425095d4377edf0eb15a
-
SSDEEP
98304:EUKGfBmXMb/IY+4J9HYH88+55PR3uRLVnpCpi5:NMXYImHV5RgtpCpi5
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1956-55-0x0000000000400000-0x00000000009CA000-memory.dmp upx behavioral1/memory/1956-56-0x0000000000400000-0x00000000009CA000-memory.dmp upx behavioral1/memory/1956-57-0x0000000000400000-0x00000000009CA000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\Y: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\Z: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\A: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\H: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\L: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\P: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\W: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\F: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\R: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\V: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\E: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\G: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\J: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\K: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\M: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\S: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\T: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\U: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\B: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\I: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\N: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\O: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe File opened (read-only) \??\Q: 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1956 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe 1956 7d02d4c4902cac07d64094e1b77e54190b7e58cad719095b503f8c85878faa84.exe