Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2023, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe
Resource
win10v2004-20221111-en
General
-
Target
46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe
-
Size
4.2MB
-
MD5
21297d50f076b23cec74bad08629dd4e
-
SHA1
3c5b4d44e0704e572526732ae960e3a75abbde8a
-
SHA256
46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25
-
SHA512
4a48248046bcb40b5fd171b4fd4cd8645ecb4e738d844a7e0696a95df7492311a6c96d4650fa0cbd25fab20171bd7ba4327d602d34149d6a43aa666757ee81f8
-
SSDEEP
98304:R3Y2EStuLemOHmxEEcsVbYxup5RWsh8H4OiZrq1DfPHNADtV6v+:NY2ELKmOHIlWsh8H4O7NADtV6v+
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\F: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\G: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\J: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\L: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\H: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\I: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\K: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\M: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe File opened (read-only) \??\N: 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2484 46d7004e275f7b1c8bce059da8ea55d47c45e240e2283c123291774ed7c20b25.exe