Analysis
-
max time kernel
1705s -
max time network
1715s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2023 22:02
Behavioral task
behavioral1
Sample
摩纳哥.7z
Resource
win10-20230220-en
windows10-1703-x64
12 signatures
1800 seconds
Behavioral task
behavioral2
Sample
摩纳哥.7z
Resource
win7-20230220-en
windows7-x64
17 signatures
1800 seconds
Behavioral task
behavioral3
Sample
摩纳哥.7z
Resource
win10v2004-20230220-en
windows10-2004-x64
3 signatures
1800 seconds
General
-
Target
摩纳哥.7z
-
Size
19.9MB
-
MD5
8d798197150cf22c2d63ff1181ca0535
-
SHA1
49bd04d964cfae91cc4021323dae9d51e8c33964
-
SHA256
00afff69b8f52c22df1875d98d75730cde0ea314c6e5b120636ed47deb12d014
-
SHA512
f84049e0266662e8aeac3a0d829e0461f9465d0450d2f5a0e111477a78aa05706d51457bb4f4d37591aac07e8e6145a05d6346210391ab4e01e211dea0904e33
-
SSDEEP
393216:O/Yz0z3hU/4T4e47EdNCVKko+kA27u2f2hLyBiFHNzF7V:Lz63hUWtjd4VCAHOENzFJ
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4304 OpenWith.exe