Analysis
-
max time kernel
75s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe
Resource
win10v2004-20220812-en
General
-
Target
e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe
-
Size
68KB
-
MD5
bcc64e143b706cd6e347dd9b369de45c
-
SHA1
d694270285ac0dd78e3bd5ad81423b3fefd64df1
-
SHA256
e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28
-
SHA512
0a57b1ab671fdcad56f753891e565e263d28c223e87a1def87d2a2af55f538165cda114e550b2f40f0178774461730a3f6f969653030698ed0bd61c70d1540c1
-
SSDEEP
768:O1UMtEqxt449AJGrU/94tlwlu85hcBR8SYSOAvwtb+3fdMgIgqXkYBIEbeCTjXhs:O1UMnxt4DGrXfouOI81so3XGb9Ypg
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\O: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\Q: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\X: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\T: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\U: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\W: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\A: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\B: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\L: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\M: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\S: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\K: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\P: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\E: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\G: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\H: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\I: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\J: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\F: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\R: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\V: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\Y: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe File opened (read-only) \??\Z: e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 956 e2b51130e08491fd11acd1482b1d829922e6c8e574b0d73742021f28bcb6ed28.exe