Resubmissions
08/03/2023, 20:17
230308-y22qlsgg93 708/03/2023, 20:12
230308-yy5m4afg4t 708/03/2023, 19:36
230308-yblayaff2t 7Analysis
-
max time kernel
290s -
max time network
266s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2023, 20:17
Behavioral task
behavioral1
Sample
hitpaw-video-converter.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
hitpaw-video-converter.exe
Resource
win10v2004-20230220-en
General
-
Target
hitpaw-video-converter.exe
-
Size
2.0MB
-
MD5
fbd4cb309b2784cd2c6887c051b5cf11
-
SHA1
1f79beb05b7adddc55543d6ee39aefa190b75d0f
-
SHA256
5c41924007da81a633015785ed64ed051f4d91b43172bf443a496319fa7a586e
-
SHA512
a4d8a734f1d4eaae112a925b4c67cb482f973eddc4cf60156c409758734c90ecd3e9d2c6e3f42f897a4d791b695f50810ec82fb083e7c32850e54846cd20b994
-
SSDEEP
49152:G5lUxo/DzEkiMgbvbpsbcOTIvZr6Zyid+30F/XRX7DU3AVszu:G3/0ktg5sjIRr6ZRd+kFJXX6S
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4832-133-0x0000000000400000-0x0000000000835000-memory.dmp upx behavioral2/memory/4832-144-0x0000000000400000-0x0000000000835000-memory.dmp upx -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.