Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
7e9699491dfa893482359d7042dfe62dbca6a4f26ca2af7d8b5745d3743c71d0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7e9699491dfa893482359d7042dfe62dbca6a4f26ca2af7d8b5745d3743c71d0.exe
Resource
win10v2004-20230220-en
General
-
Target
7e9699491dfa893482359d7042dfe62dbca6a4f26ca2af7d8b5745d3743c71d0.exe
-
Size
1.9MB
-
MD5
c2f860a1126ee82406aeaf13d0eda160
-
SHA1
2da4d257869c23709b3c430b3daef1e150818f10
-
SHA256
7e9699491dfa893482359d7042dfe62dbca6a4f26ca2af7d8b5745d3743c71d0
-
SHA512
47fe9673ad9b0452ad4958df4256ff5e1197a70368d758cf581ebf6bd0169e6eab4e88f50cf56f22ed77c0d5e80d18b6ce4220896544eaab52b444fb02d7ff54
-
SSDEEP
49152:EMPsRm5t6PGb+zqaQwsX7NAy9IeH30gW8Dpj:EM0Rm5sseqay7my9IeX0gFDpj
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 4536 7e9699491dfa893482359d7042dfe62dbca6a4f26ca2af7d8b5745d3743c71d0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
625B
MD5e5b4b0c92ce2e79eb38071876b91519b
SHA1cb5353a1402466401ebd08ca985c1ae85be8c330
SHA2560392eef7af48ecea8f4ae4e4f4d3c5ba32838acebd6fae76c74a992afcea0a8d
SHA5125da57d167f58a35ef8a6eaba59b790850d2b17633d26f07b08c589e3c9c2b8f6f8f2c692d899c63563bbaa4a4f1dcf37de8ecacabfa9b6b6c28000502f9e2c4f