Analysis
-
max time kernel
173s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 17:02
Static task
static1
Behavioral task
behavioral1
Sample
b3f0c2cb03616ef98ff2135e85e9c5f1e986ccae7d0f14de41cef96a834d38bd.exe
Resource
win7-20220901-en
4 signatures
150 seconds
General
-
Target
b3f0c2cb03616ef98ff2135e85e9c5f1e986ccae7d0f14de41cef96a834d38bd.exe
-
Size
4.2MB
-
MD5
8a596faccc060777ca231a8f828b0182
-
SHA1
25fb95946d45978945f9eba2dbd6f9ba5929b1cd
-
SHA256
b3f0c2cb03616ef98ff2135e85e9c5f1e986ccae7d0f14de41cef96a834d38bd
-
SHA512
686078b0b0589edeecbef904550e7f6cd2a7d9bf605ff0ca159a3ae0bacda2bff1efa8e052e4c37df528aa1176282b65bf3e4244e0323590147a04db3f49d316
-
SSDEEP
98304:Oh9xVYm+HMKMG0Os4RMsd3dFQc50k9Ai:O1VYFfMDAR7JQc
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b3f0c2cb03616ef98ff2135e85e9c5f1e986ccae7d0f14de41cef96a834d38bd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b3f0c2cb03616ef98ff2135e85e9c5f1e986ccae7d0f14de41cef96a834d38bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b3f0c2cb03616ef98ff2135e85e9c5f1e986ccae7d0f14de41cef96a834d38bd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b3f0c2cb03616ef98ff2135e85e9c5f1e986ccae7d0f14de41cef96a834d38bd.exe