Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
f67043f6e41e621be749b16ebced4f0ec5ab681b2d46ef3e6ea8140732d81209.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f67043f6e41e621be749b16ebced4f0ec5ab681b2d46ef3e6ea8140732d81209.exe
Resource
win10v2004-20221111-en
General
-
Target
f67043f6e41e621be749b16ebced4f0ec5ab681b2d46ef3e6ea8140732d81209.exe
-
Size
188KB
-
MD5
2d249d8ae9577f2a8aea294681791770
-
SHA1
1a67406972c28ea93fd07a1bf3c723155a062b6d
-
SHA256
f67043f6e41e621be749b16ebced4f0ec5ab681b2d46ef3e6ea8140732d81209
-
SHA512
22ab448742ed68ed3c9a7fd015fb42c43b7ee684dbda563c129e7d53055660c55ccfbe782605b4ada378cad1744b4b7f18e9692057398777c74650a060bab1f4
-
SSDEEP
3072:Otff8GerUa7lfKnllL9qp6LnJq7b+sxW3tfHA+YCbfZ/pyGGTk:Otff19a7lfKllx86LJo+owlHA+/Z/pyE
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f67043f6e41e621be749b16ebced4f0ec5ab681b2d46ef3e6ea8140732d81209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoftupNotify.exe = "C:\\Program Files\\Windows NT\\Accessories\\Accessories.lnk" f67043f6e41e621be749b16ebced4f0ec5ab681b2d46ef3e6ea8140732d81209.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Windows NT\Accessories\Accessories.lnk f67043f6e41e621be749b16ebced4f0ec5ab681b2d46ef3e6ea8140732d81209.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.