Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2023 13:27
Static task
static1
Behavioral task
behavioral1
Sample
10f3deb6c452d749_94308059b57b3142e455b38a6eb92015.cab
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
10f3deb6c452d749_94308059b57b3142e455b38a6eb92015.cab
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
authroot.stl
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
authroot.stl
Resource
win10v2004-20221111-en
General
-
Target
authroot.stl
-
Size
161KB
-
MD5
73b4b714b42fc9a6aaefd0ae59adb009
-
SHA1
efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
-
SHA256
c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
-
SHA512
73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
SSDEEP
1536:glJXlCUsGRvk/99SFrdW5ib1NWdm1wpzru2RfEyjYZjCQavSmt6t9:glJXqGRI0Sdm0zru2RUjCjvyz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4984 OpenWith.exe