Analysis
-
max time kernel
90s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2023 02:31
Static task
static1
Behavioral task
behavioral1
Sample
431c9d1220859fb0c537625b59d35081.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
431c9d1220859fb0c537625b59d35081.exe
Resource
win10v2004-20220901-en
General
-
Target
431c9d1220859fb0c537625b59d35081.exe
-
Size
2.6MB
-
MD5
431c9d1220859fb0c537625b59d35081
-
SHA1
ae81d9281799de5fee155cd469db53fb23a5dcd3
-
SHA256
e457b3018bc16e1dd54c6daff2602c1cbba9c9642a34ebf96e49321d08d3ce01
-
SHA512
f35c64c807dfebb720643f5ef037f1473e3be4cb4cef961072b02ce435eb53900d8692a6d0fd9acf8a61d9b97a8b29381584c5c0f6a1240bee4581965988e18c
-
SSDEEP
49152:ehc8/9iHVAevrKLzMbek+b4iGQzpqHB2ef+hsBzoTLaDupMeV:eh7lpeeLzM6k+h0HB2jeB8kupF
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 431c9d1220859fb0c537625b59d35081.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 431c9d1220859fb0c537625b59d35081.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\IESettingSync 431c9d1220859fb0c537625b59d35081.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" 431c9d1220859fb0c537625b59d35081.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4940 431c9d1220859fb0c537625b59d35081.exe 4940 431c9d1220859fb0c537625b59d35081.exe