Analysis

  • max time kernel
    132s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/12/2022, 15:17

General

  • Target

    363f978a27db468e8b6e8f09a9c041b04b21fb81abd060fa36b09fcbdcb813c4.exe

  • Size

    562KB

  • MD5

    59788b604afaad4383e326059c56943a

  • SHA1

    4548fe1bd1017a1682fa7ef26782136731270795

  • SHA256

    363f978a27db468e8b6e8f09a9c041b04b21fb81abd060fa36b09fcbdcb813c4

  • SHA512

    6f37d6a14335a152931c645b2e8184296975d273f941f55c4a54c9348303d716014b6f6c7b22fc684c1abfdcdfd5bf0f51149f543b76222dc09b06904a549031

  • SSDEEP

    12288:bCK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMFR:bChqKgU79usbkx+VNJhofz765hD

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\363f978a27db468e8b6e8f09a9c041b04b21fb81abd060fa36b09fcbdcb813c4.exe
    "C:\Users\Admin\AppData\Local\Temp\363f978a27db468e8b6e8f09a9c041b04b21fb81abd060fa36b09fcbdcb813c4.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads