Analysis
-
max time kernel
3s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 13:01
Static task
static1
Behavioral task
behavioral1
Sample
9e674d96d232a7f8b08154de41162633dd620dfc9cd764bc455d48fa15aeb4ea.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9e674d96d232a7f8b08154de41162633dd620dfc9cd764bc455d48fa15aeb4ea.exe
Resource
win10v2004-20221111-en
General
-
Target
9e674d96d232a7f8b08154de41162633dd620dfc9cd764bc455d48fa15aeb4ea.exe
-
Size
562KB
-
MD5
e4c3e7810c3f4a58baeff6bdeda80dff
-
SHA1
e604d32d6e1aef130f03a4b9f512f4193b5a7f1c
-
SHA256
9e674d96d232a7f8b08154de41162633dd620dfc9cd764bc455d48fa15aeb4ea
-
SHA512
32b420ba5ef73929cb36b9c1afe5062120a41082b6c135a56dc60d07da4a0fb1f481ce572262e1e1dbb9f2cf73c8ae4da3e5d4de367ebd9f950dce1d18fff13e
-
SSDEEP
12288:kCK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMFlI:kChqKgU79usbkx+VNJhofz765hM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1352 9e674d96d232a7f8b08154de41162633dd620dfc9cd764bc455d48fa15aeb4ea.exe