Analysis

  • max time kernel
    482s
  • max time network
    1589s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/02/2023, 19:55

General

  • Target

    snapshot_blob.bin

  • Size

    409KB

  • MD5

    8002a6944aec744f9221dc274351d76d

  • SHA1

    b826d401967c6bc8c10dd951b35d7bd7c6d27cd3

  • SHA256

    bb7f7f750b1ec275a009a96651868c0cbbf7828d80809c5dca945b3ec665a912

  • SHA512

    ce510135d0dcf2a95b524f6000795a3a5a29d396bc8a98e6f1fc9b8f0b92eb5585f6fda956e9380fd4f75e9a1644294f1b354a2bdcf26523cdc305460bb028f8

  • SSDEEP

    1536:T+cnVF12dTCL/TNBCR/+7c1oEcD0Oc+68KcldU1zVbnyVC2hiCfwoWJiuqi+wcWb:i5IMyWFOlFnxW1OwE6Ut4QG72Pe

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\snapshot_blob.bin
    1⤵
    • Modifies registry class
    PID:3040
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads