Analysis
-
max time kernel
106s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 02:40
Static task
static1
Behavioral task
behavioral1
Sample
c7382f63579d8c3e6dabb2b6906f318e68050a8466451123a4ff6c6d06fbddeb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7382f63579d8c3e6dabb2b6906f318e68050a8466451123a4ff6c6d06fbddeb.exe
Resource
win10v2004-20221111-en
General
-
Target
c7382f63579d8c3e6dabb2b6906f318e68050a8466451123a4ff6c6d06fbddeb.exe
-
Size
4.7MB
-
MD5
a682d15dd3b710516f5a5d1d2918a3fd
-
SHA1
edab547ac824e1f66d006082b39345b33b5cdd99
-
SHA256
c7382f63579d8c3e6dabb2b6906f318e68050a8466451123a4ff6c6d06fbddeb
-
SHA512
ee5489643616e43cec34774d251967935ab35e3ac6cf64f5e6db843f714296983365313ec751af491bdc7648098f9e0492bb76d82a0cb013053cab72a515cbd1
-
SSDEEP
98304:ufn3oyGjdgTsqxEz5nn1iBbkW4jyDIo4e3nKW2LO:uf3oyGjwbEz5nn1ObkjmD3nB2i
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1352 c7382f63579d8c3e6dabb2b6906f318e68050a8466451123a4ff6c6d06fbddeb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1352 c7382f63579d8c3e6dabb2b6906f318e68050a8466451123a4ff6c6d06fbddeb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7382f63579d8c3e6dabb2b6906f318e68050a8466451123a4ff6c6d06fbddeb.exe"C:\Users\Admin\AppData\Local\Temp\c7382f63579d8c3e6dabb2b6906f318e68050a8466451123a4ff6c6d06fbddeb.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1352