Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-03-2023 03:03

General

  • Target

    x86/peview.exe

  • Size

    204KB

  • MD5

    711be6337cb78a948f04759a0bd210ce

  • SHA1

    20c48d7dc881d2066d7702e98796eb2024c77ca9

  • SHA256

    41967c3ee8b8e2416ddb3e82d8df1219365a7b180138ca8c3256192794e5f8ff

  • SHA512

    b29c3907ceabab08d75cecc926764d54c857a4aca5728c514753c5c60ee8db061c6811c8ff0f83bf52b498325f3ddc180edf5ca91e691476ee79dd4423e99910

  • SSDEEP

    3072:2u/fuFdRj5OJJMCTut5mK4o03KmDxfcpjs7LrV40iAAjViZ0W1mBiX/DF+jQC:2u/fOjuJMCCMKP+x4jsveNgvm

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\x86\peview.exe
    "C:\Users\Admin\AppData\Local\Temp\x86\peview.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3704

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

    Filesize

    14KB

    MD5

    974e1a0053da1f9e7084acdf0ce07009

    SHA1

    3185a28f831bf91fb8b3b7608860f83688426b21

    SHA256

    d1eae90c076ea6d4fe860afc350ced8da4a54bbdc32cfbb73c03e0160159e5e3

    SHA512

    ed8ef0451664c972c44eaefe85ff3305c7245caddbd72b70da77a6e0c23f377e2daa8229ff958f9e695bc82a8e54388161f70a35a2e1318dc78389d4c0a31916