Analysis
-
max time kernel
98s -
max time network
101s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-01-2023 20:00
Behavioral task
behavioral1
Sample
0x000c0000000054a8-55.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0x000c0000000054a8-55.exe
-
Size
273KB
-
MD5
8d832a17a7134571f228bc0da586a541
-
SHA1
274f83a8874d16ff937d3e8c231bcf4916d18fe8
-
SHA256
36b9e2e48e5f7ab4543df7f80d299bb72e65c5f343d8bb1d8bff39764a829c8f
-
SHA512
0b5e00c88a35eb72b0f06d82fe3cd5a84c0520480f3d631ca42c7d3bc04bf33001f84943c6d4e9c8e1abb00414669a978de45b72b6bb8a002cc5c53d86d88bcb
-
SSDEEP
6144:ebhnot4+sbOAtbkfHLDiT6OzR8Q0l+/NyqRKbhoXqqD8XAm8B:elnot4+UwLDiT6OzR8llAgqtB
Malware Config
Signatures
-
Drops startup file 1 IoCs
Processes:
0x000c0000000054a8-55.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TestLink.lnk 0x000c0000000054a8-55.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1372-54-0x0000000075921000-0x0000000075923000-memory.dmpFilesize
8KB