Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-03-2023 05:49
Static task
static1
Behavioral task
behavioral1
Sample
5459e76ca86cd38d8a4a256489488436.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5459e76ca86cd38d8a4a256489488436.exe
Resource
win10v2004-20230220-en
General
-
Target
5459e76ca86cd38d8a4a256489488436.exe
-
Size
758KB
-
MD5
5459e76ca86cd38d8a4a256489488436
-
SHA1
a2f21eacf0a7bac7fb5eabd1eee86672ec27d298
-
SHA256
c4a95382e258044e99c625376401a7fc0602d970ebaa20c91f1e31f83038bd76
-
SHA512
f94a87b5ea6f498ff4db0fba585121f0ff0748136f2482fdb4a503e18280c74814a30c5c228c1fc7e0a14bb618a81f8932479a66f4e5fcffff4d782161a6a4f6
-
SSDEEP
12288:HyFEX6hGuVsBt0IXE/pZ2rCJj5kIqlBePHcn0INGBNcKyyizFprs/xcTB:SFEKhGus8oKcrgaI6BePcnWczyGzQ/I
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1808 5459e76ca86cd38d8a4a256489488436.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD54ca4fd3fbefa2f6e87e6e9ee87d1c0b3
SHA17cdbeb5ff2b14b86af04e075d0ca651183ea5df4
SHA256d09a8b3ade4ba4b7292c0b3da1bcb4b6c6e2012e0ccfd5e029a54af73a9e1b57
SHA512cf0f415a97fdc74568297fed4f1295d0d2aef487a308141144ef8d5f04c669ef4795c273e745b81065429adde113fcdedf4c22717a7aeef60fdcd8d4d46f97f8