Analysis
-
max time kernel
170s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
45daf70e4cd9edc10217a0958029ee35c0e67e4cf0c42a3d18583b3f668b9a65.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
45daf70e4cd9edc10217a0958029ee35c0e67e4cf0c42a3d18583b3f668b9a65.exe
Resource
win10v2004-20221111-en
General
-
Target
45daf70e4cd9edc10217a0958029ee35c0e67e4cf0c42a3d18583b3f668b9a65.exe
-
Size
562KB
-
MD5
ce4010a5adbe1789d90dab009e51da0e
-
SHA1
4adb5da1caab3a6707181f16c63add89426561a0
-
SHA256
45daf70e4cd9edc10217a0958029ee35c0e67e4cf0c42a3d18583b3f668b9a65
-
SHA512
e0e46b3dd3f8f029382c08b43ca22b529d32eb475da7eac0878804771b97c8a2e48c5a33b0d80ec9e04dad7522203936af009a11859b2fe41c97891265d383c2
-
SSDEEP
12288:DCK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMFu:DChqKgU79usbkx+VNJhofz765ho
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4416 45daf70e4cd9edc10217a0958029ee35c0e67e4cf0c42a3d18583b3f668b9a65.exe