Analysis
-
max time kernel
205s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
Resource
win10v2004-20221111-en
General
-
Target
a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
-
Size
72KB
-
MD5
8b614c4920dc4c31a936c61d148fc00d
-
SHA1
10f50e017b001eb70627898da8b49a0b97bd14e4
-
SHA256
a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117
-
SHA512
b2eb2b6f69462bc7c2f4157ad31fa36cf216aba6144f9f96925d8c746789b3f0f89ad5307a654fe0c18dbf02b0ba85e0e602af39845943196d4c546df72e0680
-
SSDEEP
768:tPwgRUmSHjgHJnF1SdUkHkrEMmrrfWSPqRNEO0YchqAtAuz:tIgRUrHjgHVfTkHvKRf0YKtA+
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4940 a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe"C:\Users\Admin\AppData\Local\Temp\a7a6eb157ca0e320304b960b1cddbf6ff7834d5d2e161039c23bef8b1792f117.exe"1⤵
- Maps connected drives based on registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4940