Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 15:22
Static task
static1
Behavioral task
behavioral1
Sample
2ebf0b7578b91d0cf48d3a9ff025beda557d6fb6dc82135fe397b483affce333.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2ebf0b7578b91d0cf48d3a9ff025beda557d6fb6dc82135fe397b483affce333.exe
Resource
win10v2004-20220812-en
General
-
Target
2ebf0b7578b91d0cf48d3a9ff025beda557d6fb6dc82135fe397b483affce333.exe
-
Size
562KB
-
MD5
1f3c58cc397ba9535a5177228c848623
-
SHA1
deff0c4f2e8a468ebdedc05f9ca7ad4b89b63967
-
SHA256
2ebf0b7578b91d0cf48d3a9ff025beda557d6fb6dc82135fe397b483affce333
-
SHA512
9573a1cf02c6f7a9e689ed06e9a8537f6141f0b955b2593e42049adca3ae3efc926433afb6a293a854dfbc8efabb6fc11c5ba7260ffae10a6427dcfdccfc298e
-
SSDEEP
12288:bCK+qK4QIUJ6ItO49LpwEBXu+OKex+VwKDPFIihoGqz765OMFiF:bChqKgU79usbkx+VNJhofz765hi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1172 2ebf0b7578b91d0cf48d3a9ff025beda557d6fb6dc82135fe397b483affce333.exe