Analysis
-
max time kernel
333s -
max time network
347s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
cab31420b0e52b11b33f73a0d0a33ab4e5654f010ff487193b80f59c4e2327a4.exe
Resource
win7-20221111-en
11 signatures
150 seconds
General
-
Target
cab31420b0e52b11b33f73a0d0a33ab4e5654f010ff487193b80f59c4e2327a4.exe
-
Size
26KB
-
MD5
8f43b59aeb545a3d22043ec018ce8829
-
SHA1
172f517fa0df5ae3c1fb944ba45de4bfd90e7374
-
SHA256
cab31420b0e52b11b33f73a0d0a33ab4e5654f010ff487193b80f59c4e2327a4
-
SHA512
145375a0801a1dbd46719dd36f82ecf5d767df3bddb8539b5da3539e6c3d95f45907b1f3f8af734ae5b1c8670147c88db853e9af4e92eebea4091bb2244c66db
-
SSDEEP
384:2v5RX7/eyZoFIle1q5brt2jZwNz99dIOyctItwqXIcLc5IxmyOgaezzasZ8zhpbQ:2xZkIRrIZYqOyctstBIcLK
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cab31420b0e52b11b33f73a0d0a33ab4e5654f010ff487193b80f59c4e2327a4.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cab31420b0e52b11b33f73a0d0a33ab4e5654f010ff487193b80f59c4e2327a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cab31420b0e52b11b33f73a0d0a33ab4e5654f010ff487193b80f59c4e2327a4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cab31420b0e52b11b33f73a0d0a33ab4e5654f010ff487193b80f59c4e2327a4.exe