Analysis
-
max time kernel
72s -
max time network
99s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 12:50
Static task
static1
Behavioral task
behavioral1
Sample
af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe
Resource
win10v2004-20220812-en
General
-
Target
af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe
-
Size
1.8MB
-
MD5
2eb229362d4a5bd422e7e0b8621165a9
-
SHA1
357aa577ceacfd5563e078241a9153bd419bcbb3
-
SHA256
af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250
-
SHA512
c6a8fb8db3e2501894ad41a0b72e3796991b356b35c47ebd20eb25752d9957423663561bbd4ebdbae3c765fe7f714d7fda1a32df12c1b9cabbdbaa8669d91b83
-
SSDEEP
49152:THY3RFelpI06JeUrVTQCWnU/Kr2qI/kycvi:THY3RII06JxVT8U/dN/9F
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe"C:\Users\Admin\AppData\Local\Temp\af2eb9827fe6202da82e8d24bed1f8813247b1e3d41a3d8becf9dc6bde2a6250.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:360