Analysis
-
max time kernel
91s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2023 16:27
Static task
static1
Behavioral task
behavioral1
Sample
94308059B57B3142E455B38A6EB92015.cab
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
94308059B57B3142E455B38A6EB92015.cab
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
authroot.stl
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
authroot.stl
Resource
win10v2004-20220901-en
General
-
Target
authroot.stl
-
Size
161KB
-
MD5
73b4b714b42fc9a6aaefd0ae59adb009
-
SHA1
efdaffd5b0ad21913d22001d91bf6c19ecb4ac41
-
SHA256
c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd
-
SHA512
73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd
-
SSDEEP
1536:glJXlCUsGRvk/99SFrdW5ib1NWdm1wpzru2RfEyjYZjCQavSmt6t9:glJXqGRI0Sdm0zru2RUjCjvyz
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
OpenWith.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2168 OpenWith.exe