Analysis

  • max time kernel
    148s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 14:52

General

  • Target

    5a2534b492ae81be3b5b1e8c2adc22df415d9d9cffeae63bd872d4b4e5d34020.exe

  • Size

    562KB

  • MD5

    6e5cd1f12d3e80a6cd55639b0553130d

  • SHA1

    60bbb36cbc0eaec74b726bb582f56c1ad977c532

  • SHA256

    5a2534b492ae81be3b5b1e8c2adc22df415d9d9cffeae63bd872d4b4e5d34020

  • SHA512

    c57b25a6e079c8a4985022538e9cb42872e481eb104739f1f273d171223b13c7ec614648e163949d501bee358846fb9907b4afbf649258449b01014310aa6f59

  • SSDEEP

    12288:0CK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMFe:0ChqKgU79usbkx+VNJhofz765hU

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a2534b492ae81be3b5b1e8c2adc22df415d9d9cffeae63bd872d4b4e5d34020.exe
    "C:\Users\Admin\AppData\Local\Temp\5a2534b492ae81be3b5b1e8c2adc22df415d9d9cffeae63bd872d4b4e5d34020.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:3416

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads