Analysis

  • max time kernel
    91s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-02-2023 21:03

General

  • Target

    134e17da6cba0af80655e5089b2fa2b897a176a58f73dede0f87f62f90d4160c.exe

  • Size

    4.2MB

  • MD5

    4fae7f8b18f65233e21bf8d23279023a

  • SHA1

    63d2caf5f862a9befaacb984a55e1ead32665014

  • SHA256

    134e17da6cba0af80655e5089b2fa2b897a176a58f73dede0f87f62f90d4160c

  • SHA512

    87fe2c4626a3f25ff2dd56063e95b32e4f9b3c8893c5a3ca54225a6c9c722a89f75ee3af6587630dcabeb0e74b6ade8694ecbb37cc84a53f73c93091f437434f

  • SSDEEP

    98304:P+Qdfwmas3A7Qi2udxQ6IUpzI5Ro3CF4LeMXVstIxgOI9fUl2ZWYFO7eL:PZomn3mQhSFIUxI5S384CMSbV9fUoZWi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\134e17da6cba0af80655e5089b2fa2b897a176a58f73dede0f87f62f90d4160c.exe
    "C:\Users\Admin\AppData\Local\Temp\134e17da6cba0af80655e5089b2fa2b897a176a58f73dede0f87f62f90d4160c.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3684
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 980
      2⤵
      • Program crash
      PID:4336
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3684 -ip 3684
    1⤵
      PID:4192

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3684-133-0x0000000000400000-0x0000000001234000-memory.dmp
      Filesize

      14.2MB

    • memory/3684-132-0x0000000000400000-0x0000000001234000-memory.dmp
      Filesize

      14.2MB

    • memory/3684-134-0x0000000000400000-0x0000000001234000-memory.dmp
      Filesize

      14.2MB

    • memory/3684-135-0x0000000000400000-0x0000000001234000-memory.dmp
      Filesize

      14.2MB

    • memory/3684-136-0x0000000000400000-0x0000000001234000-memory.dmp
      Filesize

      14.2MB

    • memory/3684-137-0x0000000000400000-0x0000000001234000-memory.dmp
      Filesize

      14.2MB

    • memory/3684-138-0x0000000000400000-0x0000000001234000-memory.dmp
      Filesize

      14.2MB