Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 04:21
Static task
static1
Behavioral task
behavioral1
Sample
e50dd2ae76f0dbca4c31eca5cae04146f500aa87301e4b95285b24022bcd83fb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
e50dd2ae76f0dbca4c31eca5cae04146f500aa87301e4b95285b24022bcd83fb.exe
Resource
win10v2004-20220901-en
General
-
Target
e50dd2ae76f0dbca4c31eca5cae04146f500aa87301e4b95285b24022bcd83fb.exe
-
Size
110KB
-
MD5
393edfaa7b454cb07c236742e7439b4a
-
SHA1
699ce2814b55319420501de0c26fbd023979d93c
-
SHA256
e50dd2ae76f0dbca4c31eca5cae04146f500aa87301e4b95285b24022bcd83fb
-
SHA512
52781ccd8fee2a92d2cbf71eed0a5650e5ee9757931e671097028747e56610c2c1e6827f8c14331ae78b134af0274d3d9f07f5168f0d9ef8b0b7740f9c6592b3
-
SSDEEP
1536:rRCRO1ExNxZBRRxKapRSgXTm75dYtO46q0q5f2L1M2dFXWwJK/2j:Y86NBF/SEa75atO46Rq5f2L1M2jrj
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 764 e50dd2ae76f0dbca4c31eca5cae04146f500aa87301e4b95285b24022bcd83fb.exe