Analysis
-
max time kernel
127s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
4b06b21b7895baf1d8188c1a70666f510c36a83b243ca233a321dd239ae7df40.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
4b06b21b7895baf1d8188c1a70666f510c36a83b243ca233a321dd239ae7df40.exe
Resource
win10v2004-20220812-en
General
-
Target
4b06b21b7895baf1d8188c1a70666f510c36a83b243ca233a321dd239ae7df40.exe
-
Size
731KB
-
MD5
d76b787f2d1e0eb0825b208b50c86201
-
SHA1
eb4e3736a5822019c82fea29b9a9af212054197c
-
SHA256
4b06b21b7895baf1d8188c1a70666f510c36a83b243ca233a321dd239ae7df40
-
SHA512
0e2e52dd18def82b1d179a9c8982c4164c1227a0b747d2c11c4e0215255989df94533c46d4381f2bf18c16a7153038921c5c5166564b442925fb5da2231bc0d0
-
SSDEEP
12288:xuudeYcGL//JWM01Vfby4QQvRO4mqPeQ9HXD4AQfP7NXy0mQR8Y5N9OQtMHnCR:xueeYT/hmflRBmqPeQ93D4AQXBC0V5sE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3260 4b06b21b7895baf1d8188c1a70666f510c36a83b243ca233a321dd239ae7df40.exe