Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-es -
resource tags
arch:x64arch:x86image:win7-20220812-eslocale:es-esos:windows7-x64systemwindows -
submitted
31/12/2022, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
РСTP.zip
Resource
win7-20221111-es
Behavioral task
behavioral2
Sample
РСTP.zip
Resource
win10v2004-20220812-es
Behavioral task
behavioral3
Sample
Resource/Applications/VPN/Data/Assets/Default/Flags/64/NZ.png
Resource
win7-20220812-es
Behavioral task
behavioral4
Sample
Resource/Applications/VPN/Data/Assets/Default/Flags/64/NZ.png
Resource
win10v2004-20221111-es
General
-
Target
Resource/Applications/VPN/Data/Assets/Default/Flags/64/NZ.png
-
Size
1KB
-
MD5
7473f6b098c05b259dbbe7c874c10820
-
SHA1
c4f8203e725b08e3106d29345ffd41a852b77e3a
-
SHA256
fce6ce3994285c37597a83f6e4d8d345873dc7d04e7357880691ef23061feb83
-
SHA512
0f3ce4fb1a0c034a2a4bc24c6f24d92c1b8c08530d255a21982381332c929a2129523816b3a4a475ba1b54afd40d8f4d5e5b826e987b837ded1f0206f868b5e3
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1328 rundll32.exe