Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
18/03/2023, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
$R3PKA4A.png
Resource
win7-20230220-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
$R3PKA4A.png
Resource
win10v2004-20230220-en
1 signatures
150 seconds
General
-
Target
$R3PKA4A.png
-
Size
3KB
-
MD5
c51fa297c0fadc389b29b11422ae5ae1
-
SHA1
db38cb2bb2a82be60641b747c555be6a554cab47
-
SHA256
77586eb8245c7d45047cad5d48c05b673484201de37f0ec156f07e0338268757
-
SHA512
eacc16597d5b32a550f2465a278ff4805541b2f91e219cc329f80b647fbfc31d76c0e64e4960954d7c05de9157435661b655a19b939664c2ebde07ffaeaf81ed
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1724 rundll32.exe