Analysis
-
max time kernel
141s -
max time network
228s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 22:40
Behavioral task
behavioral1
Sample
c773ef92381f4f149123336689f5b9b2ee86b22e963c95f8a4ea881df611101c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c773ef92381f4f149123336689f5b9b2ee86b22e963c95f8a4ea881df611101c.exe
Resource
win10v2004-20220812-en
General
-
Target
c773ef92381f4f149123336689f5b9b2ee86b22e963c95f8a4ea881df611101c.exe
-
Size
26KB
-
MD5
3dbb47403e696aae9bb403b291b6942d
-
SHA1
20eeda908eccdba45411d75d197b7ae0da46b922
-
SHA256
c773ef92381f4f149123336689f5b9b2ee86b22e963c95f8a4ea881df611101c
-
SHA512
35fbef4ef6fab78ea68501991c89f69503d704bc74bb4e8a785a2838c71327f17e7a8875c5cbb8a2fa8d352c39ccadc7c7f97b40faa2045659289975bc948b43
-
SSDEEP
768:oujaQ+Cn/SIvAC0NSKTPadt55D8Iv41iXzPn5nPe:ozQ+CnEtCZ5DJXzv5nG
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1168-55-0x0000000000010000-0x0000000000024000-memory.dmp upx behavioral1/memory/1168-56-0x0000000000010000-0x0000000000024000-memory.dmp upx behavioral1/memory/1168-59-0x0000000000010000-0x0000000000024000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\NETVISION.exe c773ef92381f4f149123336689f5b9b2ee86b22e963c95f8a4ea881df611101c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://grounydmanager.com.reality.net.my-content.net" c773ef92381f4f149123336689f5b9b2ee86b22e963c95f8a4ea881df611101c.exe