Analysis
-
max time kernel
28s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-03-2023 22:45
Static task
static1
Behavioral task
behavioral1
Sample
ssb.state.tx.us Expired Password Notification.msg
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ssb.state.tx.us Expired Password Notification.msg
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
1316.png
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
1316.png
Resource
win10v2004-20230220-en
General
-
Target
1316.png
-
Size
31KB
-
MD5
f8d5c0249ed74d165276a1224937f83d
-
SHA1
e642737245feff8ef88decd64ead075d5c02d1d9
-
SHA256
1ab70ff5acb9a5396649b8e70bf01e349c5b5321ba3334f976a7467a905ebc61
-
SHA512
d665ff2d77955d100bdd45996c7bb1de6124e296cfcb7ef512f437d5b974d481b40487036689c3890ddaf19370bfcaa7bfcc0884a1599dde51951c9385cb421c
-
SSDEEP
768:fZabaw6lf4acVCyWjEpFe4rHvuDzxnmAzwHXXMMOSawuKFUjci:hwz6WrwyHFeYWvxJwHVhOjci
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1560 rundll32.exe