Analysis

  • max time kernel
    64s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2023 09:13

General

  • Target

    Document_20019.doc.scr

  • Size

    16KB

  • MD5

    f9a777357d5780482e95abbd9333fc2e

  • SHA1

    a100f135acfe489250067fc64874b49745aa0844

  • SHA256

    b22b92d3736d46ec635e39270782ba3b2407e465212d222723e3b709df0e95ee

  • SHA512

    067c72522e39dcfb4ad2810af270ecfb0e0018a7905a4a244fc7b80a52c79d0c56f4337ea80d476ffe627ca10e86d9a5ea9eb113a04f4d37333b6f663785a648

  • SSDEEP

    384:k1Cn5npM3216i7jToD/vWoveM87zaL5j8J9OxX:N5npM3gFcD/vba7zH3OJ

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Document_20019.doc.scr
    "C:\Users\Admin\AppData\Local\Temp\Document_20019.doc.scr" /S
    1⤵
    • Checks computer location settings
    PID:4752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads