Analysis
-
max time kernel
350s -
max time network
372s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 09:46
Static task
static1
Behavioral task
behavioral1
Sample
8758a295b0a5d045054a59ba1e017fb54b86ae638cba5f5d9d647fd08f627f9d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8758a295b0a5d045054a59ba1e017fb54b86ae638cba5f5d9d647fd08f627f9d.exe
Resource
win10v2004-20221111-en
General
-
Target
8758a295b0a5d045054a59ba1e017fb54b86ae638cba5f5d9d647fd08f627f9d.exe
-
Size
168KB
-
MD5
c379de2be86108ebbe873e458e012a0b
-
SHA1
643725ca6a786f58a856c559dc2d5ff147fe0472
-
SHA256
8758a295b0a5d045054a59ba1e017fb54b86ae638cba5f5d9d647fd08f627f9d
-
SHA512
f5ca6fcb712cf21bf5d5d96ba82dd88a73acbdb420461026dc9a2b9ca1df7138219e6a6b033842c5d8b3619cd77a4150148882a32bc6af6fc420fdd41027a47a
-
SSDEEP
3072:TLQj7cyYnRshndKAH4r3h2Wm3BWjqLSmP1Vwpn24tU0FjCwH:TLQUnRshdO3oGmnCpn2S
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4952 8758a295b0a5d045054a59ba1e017fb54b86ae638cba5f5d9d647fd08f627f9d.exe