Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
4ac63c0ad3e2a826c010b01ac5837b3dd1f10a239336f1cf784b279ef33aa9f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4ac63c0ad3e2a826c010b01ac5837b3dd1f10a239336f1cf784b279ef33aa9f6.exe
Resource
win10v2004-20220812-en
General
-
Target
4ac63c0ad3e2a826c010b01ac5837b3dd1f10a239336f1cf784b279ef33aa9f6.exe
-
Size
562KB
-
MD5
fd69de5ab9244115139302e51a944d20
-
SHA1
5d884f5d38341181c8da07fa18f9c6ac096f967f
-
SHA256
4ac63c0ad3e2a826c010b01ac5837b3dd1f10a239336f1cf784b279ef33aa9f6
-
SHA512
a5f0c3a4e9deec0dad4cf1ab8c6db3f609048b6aa27cb94c1ceb2657363d361aa44b12f885346b59b86c3f63c52c84d5ba885903469b5a12c4b1b3907d7e7e5e
-
SSDEEP
12288:MCK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMF3:MChqKgU79usbkx+VNJhofz765h9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 288 4ac63c0ad3e2a826c010b01ac5837b3dd1f10a239336f1cf784b279ef33aa9f6.exe