Analysis
-
max time kernel
79s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 08:56
Behavioral task
behavioral1
Sample
6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe
Resource
win10v2004-20220812-en
General
-
Target
6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe
-
Size
666KB
-
MD5
02ce764eb8d8296b8cdcf27938ca9440
-
SHA1
0cef9721619820c21a29a2d76d17965a157058a6
-
SHA256
6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48
-
SHA512
2967bdf9068ed2257a7b538fa1db3dde1c2306665df50df8b9314ae50f9efa0f0ee9311c3759323f804f881400a95bee63d1b650dd067b25e7f9d57dd82e2d4e
-
SSDEEP
12288:Itl5O9IqNzv1MN5AKZhffs5VQDaccN8VCJhtB1SX79dOniD/JxnqIdWStM:25QMvAKZhffi2cfzB4XZdTD/HnVsStM
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1000-55-0x0000000000400000-0x00000000004E1000-memory.dmp upx -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\x: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\m: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\u: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\y: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\z: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\a: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\f: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\l: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\q: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\r: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\s: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\v: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\w: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\j: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\k: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\h: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\i: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\n: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\o: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\p: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\t: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\b: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe File opened (read-only) \??\g: 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1000-55-0x0000000000400000-0x00000000004E1000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1000 6c84d678bf9488775944dcaeecfec8156164c56b083e74ca052724206735bc48.exe