Analysis
-
max time kernel
110s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
dc5dbaec79a2b312d245de8e05efd500010a30279fbf4d1697cf5a5ee3a34373.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dc5dbaec79a2b312d245de8e05efd500010a30279fbf4d1697cf5a5ee3a34373.exe
Resource
win10v2004-20220812-en
General
-
Target
dc5dbaec79a2b312d245de8e05efd500010a30279fbf4d1697cf5a5ee3a34373.exe
-
Size
2.0MB
-
MD5
8805c3027147835dad7825301e5c4f80
-
SHA1
953e1d83a216934c65257a0fc8a2561c7cf29e52
-
SHA256
dc5dbaec79a2b312d245de8e05efd500010a30279fbf4d1697cf5a5ee3a34373
-
SHA512
9f1c6102310485fb9ffa3a1da6997cb49b171134837d04631af77f70e2aa800d9beb71de52df7c3a3406eb85ac49065fc53dd3ad5a3303e7ff033ba0bafade86
-
SSDEEP
49152:hEdvDkYZ12B41MJsHKfOGzAIxve4DhNsBniKpfKynky0lu:hEZDkTNOyOGzAIxW44Bbncu
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1972 dc5dbaec79a2b312d245de8e05efd500010a30279fbf4d1697cf5a5ee3a34373.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1972 dc5dbaec79a2b312d245de8e05efd500010a30279fbf4d1697cf5a5ee3a34373.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc5dbaec79a2b312d245de8e05efd500010a30279fbf4d1697cf5a5ee3a34373.exe"C:\Users\Admin\AppData\Local\Temp\dc5dbaec79a2b312d245de8e05efd500010a30279fbf4d1697cf5a5ee3a34373.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1972