Analysis

  • max time kernel
    185s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 07:55

General

  • Target

    870d3192b8a28b5f902275936175afa9c81c0ae3b6397977669ba07e7f32deda.exe

  • Size

    32KB

  • MD5

    f4d8999a9ecd920461d7c15c4b4a8890

  • SHA1

    21b5368e18f3ae55b26abd80536179b957aa6ef8

  • SHA256

    870d3192b8a28b5f902275936175afa9c81c0ae3b6397977669ba07e7f32deda

  • SHA512

    8b9d964af88584852140916aec487df76348f10eb321b6ddb55d61b5a096d72eebb58f625c77f574f6811741f07e36d048d570032adbe10193eed162d56424cc

  • SSDEEP

    384:xJF4NOFcOrdNFYlcIUgEGS8KUmXUkx+AAf7ElkFDUsvzOFc:LF4kFVZTSSgEGS8/mLYDEl+BvqF

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\870d3192b8a28b5f902275936175afa9c81c0ae3b6397977669ba07e7f32deda.exe
    "C:\Users\Admin\AppData\Local\Temp\870d3192b8a28b5f902275936175afa9c81c0ae3b6397977669ba07e7f32deda.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4232
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4148

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads