Analysis

  • max time kernel
    125s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2022, 18:27

General

  • Target

    36ff5501778374817c6eee51966e4b4da4845db57e2fe58c745d954e7fb3f36f.exe

  • Size

    516KB

  • MD5

    3fc8aef51b7d77fac24f4d42e6e5ea75

  • SHA1

    9285c3b941d89ef46436cecdce4af6037ce1bbca

  • SHA256

    36ff5501778374817c6eee51966e4b4da4845db57e2fe58c745d954e7fb3f36f

  • SHA512

    ddc538b05db6ae712fd4702f9d58528cacda55de1d9113b82eaf7453a66b40434a5595a37d24390b1366ba7fafa06adb5cef44cac103e641c5f1626ce3f607e6

  • SSDEEP

    12288:/LvTwCXi8lwtNCFY5hH1Ygm/Ll4tl+eIO9CVRiMi7:/khOgyl43AACVRRi7

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36ff5501778374817c6eee51966e4b4da4845db57e2fe58c745d954e7fb3f36f.exe
    "C:\Users\Admin\AppData\Local\Temp\36ff5501778374817c6eee51966e4b4da4845db57e2fe58c745d954e7fb3f36f.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1216

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1216-54-0x0000000075D01000-0x0000000075D03000-memory.dmp

          Filesize

          8KB

        • memory/1216-55-0x0000000074B91000-0x0000000074B93000-memory.dmp

          Filesize

          8KB

        • memory/1216-56-0x0000000000400000-0x000000000048C000-memory.dmp

          Filesize

          560KB