Analysis
-
max time kernel
171s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
8daecb6f790f586f5b312ba537cb64c099ad8cab4bce5878cc24ecf762e52360.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8daecb6f790f586f5b312ba537cb64c099ad8cab4bce5878cc24ecf762e52360.exe
Resource
win10v2004-20221111-en
General
-
Target
8daecb6f790f586f5b312ba537cb64c099ad8cab4bce5878cc24ecf762e52360.exe
-
Size
32KB
-
MD5
46353bc5e11701b9c747658f8fca4e40
-
SHA1
ec0f3e21913b027aa6c305f2300bc0c5a773dbef
-
SHA256
8daecb6f790f586f5b312ba537cb64c099ad8cab4bce5878cc24ecf762e52360
-
SHA512
1bb35794eefd7e005a97505703d82cab115bde3cd50b8057b2e614bf159f6b68fd564d383c19df7cb8b48b4b315cf7ed18c7c214260ffd27ce07d132c2e27bcf
-
SSDEEP
384:bn6UEiJ+EBGEohpXngSWln5ZuEj8TCW4M:76UEiJvsvWlnLR8TCW4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 8daecb6f790f586f5b312ba537cb64c099ad8cab4bce5878cc24ecf762e52360.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2600 8daecb6f790f586f5b312ba537cb64c099ad8cab4bce5878cc24ecf762e52360.exe