Analysis
-
max time kernel
365s -
max time network
434s -
platform
windows10-1703_x64 -
resource
win10-20220812-es -
resource tags
arch:x64arch:x86image:win10-20220812-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
06-12-2022 06:15
Static task
static1
Behavioral task
behavioral1
Sample
Claim_PE84.vhd
Resource
win10-20220812-es
Behavioral task
behavioral2
Sample
Claim_PE84.vhd
Resource
win7-20220901-es
Behavioral task
behavioral3
Sample
Claim_PE84.vhd
Resource
win10v2004-20220812-es
General
-
Target
Claim_PE84.vhd
-
Size
2.0MB
-
MD5
2fe68553beb0a7b084f1b349d6551d9c
-
SHA1
c7e8f7b9313e876b10623840989fb07c00203930
-
SHA256
edcb8d8e80eb826ec95ed9ccdc1d4470c3edd1782350187fc9bcd776c6d96095
-
SHA512
cf9d306a0948217c32dd865a1926c18405cb0e24aef2eadd4bdd81bf9376783fa1a44de90ddc0926e4e6f41094cff99869b325b6d22a200f8f8161ee177fc0a1
-
SSDEEP
24576:/wWw8wewswUwBw6gwsw3wTOZqHk2JajfRO8:/wWw8wewswUwBw6gwsw3waZaUY8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings cmd.exe