Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
b37668d0d4b4a31ec48e16fc335172b5df0c69c83609ab71a3705d27ed2cd23a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b37668d0d4b4a31ec48e16fc335172b5df0c69c83609ab71a3705d27ed2cd23a.exe
Resource
win10v2004-20220812-en
General
-
Target
b37668d0d4b4a31ec48e16fc335172b5df0c69c83609ab71a3705d27ed2cd23a.exe
-
Size
638KB
-
MD5
ece0b1afffb310ba185daa29b0aec2c3
-
SHA1
399034b50c0211c52f5ca51bb22f0435842663a5
-
SHA256
b37668d0d4b4a31ec48e16fc335172b5df0c69c83609ab71a3705d27ed2cd23a
-
SHA512
a3a3db8014487e9d04bfea5393933685711fca9799671a2e07a6d17915817a0c2985717bd7de68c955eba5bb0b9a4a5874a1945dce9ae4244fdbe6ca4f0239f4
-
SSDEEP
12288:NuudhYcGL//JWM01Vfby4QQvRO4mqPeQ9HXD4AQfyjloMDPeu/CDxwL6P7:NuehYT/hmflRBmqPeQ93D4AQKjOMDPFQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1224 b37668d0d4b4a31ec48e16fc335172b5df0c69c83609ab71a3705d27ed2cd23a.exe