Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/01/2023, 05:00 UTC

General

  • Target

    [IBRA-2022]Mina2/cueva1v2.dff

  • Size

    133KB

  • MD5

    97d207bb262e38f01cf7bcb2879d477e

  • SHA1

    4143ba46261c825699ce68da251c8ef56e5a4321

  • SHA256

    258d26c60de2d7bdab1058a5a9c34dc67ba574bebb4d3a751465f0a23d64c429

  • SHA512

    ba10e3cdc7e2650523af20e90c717c482efaf84639534624dd23bd87d674e0564c4d14218eae5608ba6110a7f1233a9c0cfadb375529adc583bae04ff35b0710

  • SSDEEP

    3072:DNAz0CTTTTTTTTTTTTTTTTTTTTTTTTTTswzwcIaZGjsLfOyKiIiS6yVSLa0F:RuTTTTTTTTTTTTTTTTTTTTTTTTTTs8PZ

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\[IBRA-2022]Mina2\cueva1v2.dff
    1⤵
    • Modifies registry class
    PID:2416
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3068

Network

    No results found
  • 52.178.17.3:443
    322 B
    7
  • 178.79.208.1:80
    322 B
    7
  • 178.79.208.1:80
    322 B
    7
No results found

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.