Analysis

  • max time kernel
    1564s
  • max time network
    1590s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2022, 14:34

General

  • Target

    die.exe

  • Size

    11.0MB

  • MD5

    74ab9f48b6075de95bb15e4a5d61ba6e

  • SHA1

    e99875e1da34a51cb5688c9216c9fc4d88efb946

  • SHA256

    a81f8e55a3bdf750c5d7dec6c1d60c37138181efd73647ddaa03e4eb6602f29e

  • SHA512

    0fff06ce769b0c818900e7c5b16c2455b1879a65800872c105806a243214f46a0f48305a9f5937a35ec345c564e346d97a0256aeebe8cf238dff359a60d42812

  • SSDEEP

    49152:t7ESKvZOxeg5PB+PElvaBKq/aqOPIgzEt4t5bXbMGwLRyMAEG2kxbMe00yCTXNK9:tmmBjKpCqOgI5EG0e008gz0

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\die.exe
    "C:\Users\Admin\AppData\Local\Temp\die.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:4520

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4520-132-0x00007FF7700F0000-0x00007FF770BF1000-memory.dmp

          Filesize

          11.0MB

        • memory/4520-133-0x00007FFFCEA90000-0x00007FFFCEFD1000-memory.dmp

          Filesize

          5.3MB

        • memory/4520-134-0x0000015BFE100000-0x0000015BFE110000-memory.dmp

          Filesize

          64KB