Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 14:30
Behavioral task
behavioral1
Sample
ca7023e3a8f2ef3fb729bebf16edfbe8fa38e7c85006112f6361d57f7508177d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ca7023e3a8f2ef3fb729bebf16edfbe8fa38e7c85006112f6361d57f7508177d.exe
Resource
win10v2004-20220812-en
General
-
Target
ca7023e3a8f2ef3fb729bebf16edfbe8fa38e7c85006112f6361d57f7508177d.exe
-
Size
42KB
-
MD5
ee3f4afcc5664af0d644c7d6a103d06a
-
SHA1
0b152d9df67c8daa2175d77a1439dd1b6fd0ffd9
-
SHA256
ca7023e3a8f2ef3fb729bebf16edfbe8fa38e7c85006112f6361d57f7508177d
-
SHA512
33212a053d73c3340026232d95b6de0bf9b479dbaf451591f37ed2df7d03114ee706dfc5bb3903135027f903a32321f3d5ece74eecd7fc1966e2824d350490d8
-
SSDEEP
768:rBzmVN+sk4/bjX3oDJTjzl9YvoY6YRxYv04BUnpMU4Hp:rBzm3Vk4jjSPzHcofYRxYv0sUnpMU4Hp
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1444-55-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.