Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-02-2023 03:04

General

  • Target

    92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3.exe

  • Size

    1.3MB

  • MD5

    5246f5d604717e27fe9f3c969c6d0653

  • SHA1

    1fc32e3e8ee272ea3175fea25f4c8ec446f3c271

  • SHA256

    92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3

  • SHA512

    80e71d15c6124fbfcac3c87f877560efdbe54efe45a74ee24288378ee4e3c0761b9eaa11cd35fb92d63b0ebf0ff21e92aa22d99bff6b0c8341da2b49bb062b24

  • SSDEEP

    12288:VJeDTzwJeC8EXIwmFgc9ckEUJDTwALNx/WIBi5pWeggZyBmtMQuGWSb34NCVEkm4:+3Mv4w6wkxeBjFhtINYlWEJ

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3.exe
    "C:\Users\Admin\AppData\Local\Temp\92965e96be015ec583ec769c3165093a8c7bfa3d2e4cfa94d52ff80cc6b9f5a3.exe"
    1⤵
    • Adds Run key to start application
    PID:940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/940-54-0x0000000076411000-0x0000000076413000-memory.dmp

    Filesize

    8KB