Analysis
-
max time kernel
29s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21/03/2023, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
TELECOMMUNICATIONS CITRIX SHAREFILE VIOP-6193249344.msg
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TELECOMMUNICATIONS CITRIX SHAREFILE VIOP-6193249344.msg
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
image001.png
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
image001.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
image002.png
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
image002.png
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
image003.png
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
image003.png
Resource
win10v2004-20230220-en
General
-
Target
image001.png
-
Size
1KB
-
MD5
3d8063a8b71aaeb8d70d78e498d32606
-
SHA1
53e9de05c8de86237559b1c48e0d144bfd8a03b7
-
SHA256
dcd5ef6d9a3d8d9c148e65e11e3de042d9582cc4fba38fc6527937f2df289f58
-
SHA512
d239647c8488eceaaafa89128a369109dde09cb03f671c3d2105689d1430a5a8770dd8d4656f4a53da773d2b4aad0c549776208345f75a8843f961baa490cc51
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1268 rundll32.exe