Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe
Resource
win10v2004-20220812-en
General
-
Target
e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe
-
Size
1.4MB
-
MD5
fa48bbbdb257396e11d903cd37e1b0f6
-
SHA1
35033df957d7260f197bdaf9c8b3456caf2f20a1
-
SHA256
e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3
-
SHA512
48e0aaba22f6885791042db115a00644af178cb27cb53cd8604d8132cd2f3e1820dce0aad862b672ce8407e84d7e000d5ccaceb9d9a9706b3a81a38ce6d288f5
-
SSDEEP
24576:E0nciG2RblCP0XDUoY3Nlxl2Y42xfuHM2MidSP9Bd4hWwPXt:HciG2JIsXDUL3Nlxlo2RulMiaRw/t
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1532 2732 WerFault.exe 75 -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2732 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 2732 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 2732 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe 2732 e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe"C:\Users\Admin\AppData\Local\Temp\e8701760ae0627e7eda7571322fa1f698aa3bd2477fe03a2c97dce9e30c7a5d3.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 24082⤵
- Program crash
PID:1532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2732 -ip 27321⤵PID:1472
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc NDIS NDIS-20221210-1531.dmp1⤵PID:1028