Analysis

  • max time kernel
    144s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 01:44

General

  • Target

    8b37f889d22e0713d2930dcf25427dbcf21a7c72347b0c531a0d90ac6a460253.exe

  • Size

    2.6MB

  • MD5

    de8ff33ca780fd42b143a796d11cf8bb

  • SHA1

    39f7e61c40337875df86b3c6ee250711f14d23f1

  • SHA256

    8b37f889d22e0713d2930dcf25427dbcf21a7c72347b0c531a0d90ac6a460253

  • SHA512

    ca9fdffa0b349f6ed29abce6798aa7cc9420e8b937827e5da91f7f60a766e1eb8849239366bae9fd39aaf102b7da197de871f7a79b7128aa0b9aafcbfae21629

  • SSDEEP

    49152:2/U3gyuwwNcDINH4/iXKnFQTdG2dYdyDIDL3bz4274nw3Vx3PPGEg7zS2LO:kU31uBuDINY/cTdG2iyDIDcG4e3nKW2i

Score
8/10
upx

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b37f889d22e0713d2930dcf25427dbcf21a7c72347b0c531a0d90ac6a460253.exe
    "C:\Users\Admin\AppData\Local\Temp\8b37f889d22e0713d2930dcf25427dbcf21a7c72347b0c531a0d90ac6a460253.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4840-132-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/4840-133-0x0000000000B30000-0x0000000000B36000-memory.dmp

    Filesize

    24KB

  • memory/4840-134-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB

  • memory/4840-138-0x0000000000400000-0x0000000000590000-memory.dmp

    Filesize

    1.6MB