Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 13:08
Static task
static1
Behavioral task
behavioral1
Sample
26515b1fc546c78e58ad62a27f2c39cbc2708b3997caa4b3f2d9ff68a110138a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
26515b1fc546c78e58ad62a27f2c39cbc2708b3997caa4b3f2d9ff68a110138a.exe
Resource
win10v2004-20220812-en
General
-
Target
26515b1fc546c78e58ad62a27f2c39cbc2708b3997caa4b3f2d9ff68a110138a.exe
-
Size
562KB
-
MD5
5fad7d247418b5fec4be2685fb3a9dfe
-
SHA1
f117ce8d1bdf4937861d587f05f6c411d5dc3c3c
-
SHA256
26515b1fc546c78e58ad62a27f2c39cbc2708b3997caa4b3f2d9ff68a110138a
-
SHA512
9564272e7fc3dc45eb2c13a21294bc557a0bbe9e5702d43760193c8d0a1e3db6a4120bd85f5fe8030b262fb1109975979d8c8a9cd4f92155fcfee23128237a79
-
SSDEEP
12288:LCK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMFV:LChqKgU79usbkx+VNJhofz765hX
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4736 26515b1fc546c78e58ad62a27f2c39cbc2708b3997caa4b3f2d9ff68a110138a.exe