Analysis
-
max time kernel
178s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:22
Static task
static1
Behavioral task
behavioral1
Sample
945fbca8ed4e02fdd728dc7e5bbc2ef10b97d79de147ebc2e0cb363bd68055d8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
945fbca8ed4e02fdd728dc7e5bbc2ef10b97d79de147ebc2e0cb363bd68055d8.exe
Resource
win10v2004-20220812-en
General
-
Target
945fbca8ed4e02fdd728dc7e5bbc2ef10b97d79de147ebc2e0cb363bd68055d8.exe
-
Size
2.0MB
-
MD5
12e283bc3c56062f75d06a831e53e332
-
SHA1
1a57dd21219aad66e9ef353d13ce07a8df30bb06
-
SHA256
945fbca8ed4e02fdd728dc7e5bbc2ef10b97d79de147ebc2e0cb363bd68055d8
-
SHA512
30be4d403f53599c411772d934df8cccb87d8b99b4e803af279e49e7a2d9c9ea7306de0f4fe8564884a8440d719a147d2f0e37d24aa71faa3df5e30ee58f7f5b
-
SSDEEP
24576:eLnE8xAb0ppWP32pxEq/vchFBhkHUDSfq9tI2OlYvkyTF44dUdWio2KMgZVilfxv:eLnk/P+4FURc1AITu4IlR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.