Analysis
-
max time kernel
113s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
09-12-2022 14:02
Static task
static1
Behavioral task
behavioral1
Sample
84d7230316c0bfff0a616eead303aa45af3eb5ce3ad55ad3eb99f00b0458ac17.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
84d7230316c0bfff0a616eead303aa45af3eb5ce3ad55ad3eb99f00b0458ac17.exe
Resource
win10v2004-20221111-en
General
-
Target
84d7230316c0bfff0a616eead303aa45af3eb5ce3ad55ad3eb99f00b0458ac17.exe
-
Size
669KB
-
MD5
8698d231ca2e4dc4ddd8280a3b5b13da
-
SHA1
0936250d735054f4af8edcccea47978ad43d5a8a
-
SHA256
84d7230316c0bfff0a616eead303aa45af3eb5ce3ad55ad3eb99f00b0458ac17
-
SHA512
cc1b876f492565561f5e671fd0eda183573ccd57a0678832f5b74765678b239d32628df178f6e2cb360d1d7e45b1479864db49bf2468337f9a2222c57f7515dc
-
SSDEEP
12288:Tb0XDnlN4JMhvLy4cEsHEbeIZkrjc06uiM7SJYG2IpSJmYAheyMfT:Tb0XaCcEomeIeXF+v2IphYaHMfT
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
84d7230316c0bfff0a616eead303aa45af3eb5ce3ad55ad3eb99f00b0458ac17.exepid process 1996 84d7230316c0bfff0a616eead303aa45af3eb5ce3ad55ad3eb99f00b0458ac17.exe -
Drops file in Windows directory 1 IoCs
Processes:
84d7230316c0bfff0a616eead303aa45af3eb5ce3ad55ad3eb99f00b0458ac17.exedescription ioc process File opened for modification C:\Windows\resources\PALAEOHERPETOLOGIST.kar 84d7230316c0bfff0a616eead303aa45af3eb5ce3ad55ad3eb99f00b0458ac17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88