Analysis
-
max time kernel
232s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
101748c25959581e63a1f5e192b947c0e1aaece818346cf805adf0da439d7dc7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
101748c25959581e63a1f5e192b947c0e1aaece818346cf805adf0da439d7dc7.exe
Resource
win10v2004-20221111-en
General
-
Target
101748c25959581e63a1f5e192b947c0e1aaece818346cf805adf0da439d7dc7.exe
-
Size
564KB
-
MD5
fb6e70c72fcef902869e5f8f75e90e31
-
SHA1
7a2220bed94ffa63354d05dd8faf42da8f722371
-
SHA256
101748c25959581e63a1f5e192b947c0e1aaece818346cf805adf0da439d7dc7
-
SHA512
a058c5a48c866757a0c61e5f790c7a957445f17eed7a0ccd32a80b2c77963da7f18ced2976e89dd059e2c393e1283005884ca7b4276e73d9d9835b3a40c10153
-
SSDEEP
12288:vGQlIdQ8lIglrNYlPGAHQlmKgGRPcIxWcOAsZ:v/IdQ8KglrNYltim/GRJx8AG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 628 101748c25959581e63a1f5e192b947c0e1aaece818346cf805adf0da439d7dc7.exe