Analysis
-
max time kernel
61s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2023, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
Desktop.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Desktop.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
WSKENXR.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
WSKENXR.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
hpc.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
hpc.exe
Resource
win10v2004-20230220-en
General
-
Target
Desktop.rar
-
Size
7.9MB
-
MD5
a67dd1fd2e6766a5cf2df9f22fefb70f
-
SHA1
7b22c60a393a487be8cb690426528bc8c9ed16c9
-
SHA256
8e5caecea47361361a7d9db02ec614e16884a7dd4c6ebfa029df390ab31eafd2
-
SHA512
7d0b68fab411f812263d1aa3982a5e893fb175e341c06e8b79150e9b25a7d46ce1c6551b14997af249cc6085f54cbc4ef67301390d3d7afc977e9a6ad230a968
-
SSDEEP
196608:2R34ZIR34ZWeE+QMzuBKPw8NRziMTU1vE1yE9BbdJWmEoAWVSmw8dSn:/55E+Q7BKPw8N1iMTUBE1yQJWmEoA3mI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4760 OpenWith.exe