Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
f9e5670c7938b0dafd09edd45452b59bc01b026f7e3e05c141498f99df9a5206.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f9e5670c7938b0dafd09edd45452b59bc01b026f7e3e05c141498f99df9a5206.exe
Resource
win10v2004-20221111-en
General
-
Target
f9e5670c7938b0dafd09edd45452b59bc01b026f7e3e05c141498f99df9a5206.exe
-
Size
6.1MB
-
MD5
9f4ca200f5ff611534f8d851709d664f
-
SHA1
1a633c47ffe167d06d378d986b19d0566d69765d
-
SHA256
f9e5670c7938b0dafd09edd45452b59bc01b026f7e3e05c141498f99df9a5206
-
SHA512
66a71199ccd47a43943e1edaec85ea17ce5f170ed6046fa849b8cda426d9b048b9b763a0f503e3b94c762fc8b6212ee76f679404646d66c452b839845fe45d26
-
SSDEEP
49152:KcvySU3qGT9MkVqKfQnoZJYmBPogWRp7T4TCxup6vt+pOEJ0OXNS6KXoIl0slsPB:NfkVxvreLRpNxMEtsV4ltP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1204 f9e5670c7938b0dafd09edd45452b59bc01b026f7e3e05c141498f99df9a5206.exe