Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/01/2023, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
RV Proveedor En Aire Comprimido y Servicio de Mantenimiento.msg
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
WhatsApp Image 2022-12-17 at 11.23.46 AM.jpg
Resource
win7-20221111-en
Behavioral task
behavioral3
Sample
WhatsApp Image 2022-12-17 at 11.23.47 AM.jpg
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
image003.png
Resource
win7-20221111-en
General
-
Target
image003.png
-
Size
28KB
-
MD5
e1ede6717df4b1c377725280f7c14f7c
-
SHA1
f39e21e10a499b296b9c4864f2b8c1e91609a65d
-
SHA256
9ad58b20feb4074746aec764d3ee422ba03250f12e11cc579a648ad9028545f5
-
SHA512
63c99badfb5dbd9ca88d7dd1dc8768068db05efaf473821eea6af808bcc07dbdce185b89b97c57d034e480806392b15e03689935ada1f99961924cdb40d13a1e
-
SSDEEP
768:JI/6WvXbkDXmGhXruUoPUproJpAoAgs6QF087:JIoaGhXrzoIoJpAej87
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 rundll32.exe