Analysis
-
max time kernel
192s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
834dd6649a04c76a98321cad0aada325d141d858fb7365c223df439aa00805da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
834dd6649a04c76a98321cad0aada325d141d858fb7365c223df439aa00805da.exe
Resource
win10v2004-20221111-en
General
-
Target
834dd6649a04c76a98321cad0aada325d141d858fb7365c223df439aa00805da.exe
-
Size
747KB
-
MD5
616cc274040d0a9a9bc450d738c84a7d
-
SHA1
5154c151c32a597968c66ebeb4a6e362b5be0602
-
SHA256
834dd6649a04c76a98321cad0aada325d141d858fb7365c223df439aa00805da
-
SHA512
0a076076695b0e29d423f0446631e3532697ffa39f46f36015f22f74af31d895b9aff75d9ddea33eb8dbb88a6ae357967d08c06d3c7ecd0eab98a5cfa35091f1
-
SSDEEP
12288:E+J0p6T06/rm6agttTknjkxCdDLAvzVi1X6U+P9iDdHteHCZSxCND:Eym6H/SSjMyvzVi1KU+sDzeiQxCt
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1600 834dd6649a04c76a98321cad0aada325d141d858fb7365c223df439aa00805da.exe