Analysis
-
max time kernel
152s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
59c1ceca7b222032276994ac3df266fa4fcfa517737f5d0a88f75a50186ee6e6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
59c1ceca7b222032276994ac3df266fa4fcfa517737f5d0a88f75a50186ee6e6.exe
Resource
win10v2004-20221111-en
General
-
Target
59c1ceca7b222032276994ac3df266fa4fcfa517737f5d0a88f75a50186ee6e6.exe
-
Size
562KB
-
MD5
051b5635ff953fdc2c8cb430ec932987
-
SHA1
342d94418cccab94990e586cc61c80b0f60b5671
-
SHA256
59c1ceca7b222032276994ac3df266fa4fcfa517737f5d0a88f75a50186ee6e6
-
SHA512
9c6cf7da0b4406499cfa701f9624d63ce538143b274b6a1b3cd0f01427bcf5da265cad9752b3dc2e451c4a62c069ace22c4bc21f6b9e0ea6518ecf3064ea0cf3
-
SSDEEP
12288:jCK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMFl:jChqKgU79usbkx+VNJhofz765hv
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2356 59c1ceca7b222032276994ac3df266fa4fcfa517737f5d0a88f75a50186ee6e6.exe