Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-04-2023 18:29
Static task
static1
Behavioral task
behavioral1
Sample
edee91b9723d12ba9f50ad0384c2cfa472b81cc7265280868020e3a3e05a69c9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
edee91b9723d12ba9f50ad0384c2cfa472b81cc7265280868020e3a3e05a69c9.exe
Resource
win10v2004-20230220-en
General
-
Target
edee91b9723d12ba9f50ad0384c2cfa472b81cc7265280868020e3a3e05a69c9.exe
-
Size
11.6MB
-
MD5
0a73083de5e80d8e0657fd5188230c0c
-
SHA1
3525c64c1d18fb5f79a4752bc727569cbf0c10b5
-
SHA256
edee91b9723d12ba9f50ad0384c2cfa472b81cc7265280868020e3a3e05a69c9
-
SHA512
6248781e973441e9f3bfb76588152e611e4111779be1897f452232b30c7cb2a35af41216eb6278245088cbb67d73a4e6029fabd198e7f53e46e18b6e95757264
-
SSDEEP
196608:Oh/Wduf8jW7H+RejakjMHstgh6PpU7f4Ea5wbeLNqptIljYfAohYvZ7bqWme:G8G6em3HstgKU05wwNqptY0fJhYlxz
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 1416 edee91b9723d12ba9f50ad0384c2cfa472b81cc7265280868020e3a3e05a69c9.exe 1416 edee91b9723d12ba9f50ad0384c2cfa472b81cc7265280868020e3a3e05a69c9.exe 1416 edee91b9723d12ba9f50ad0384c2cfa472b81cc7265280868020e3a3e05a69c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e4ec95271ff1bcebab49bdfed6817a22
SHA12c03e97f4773aea80ecdb98a1482e5896fe4677b
SHA256ee1c06692a757473737b0ebdef16f77b63afac864d0890022d905e4873737dd6
SHA512771a527133806307a1b17b7e956d6a3c16e9bc675bf084b43204ae784a057dac2726dbf90645692876043a4e7365ba8825c167621fde4760c79cd84679e2aa3d
-
Filesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
Filesize
21KB
MD52e3fe91758d2e8a4937333c0e3d196d8
SHA1e3b9660c3ab0119dbf40f0e4a8c749eaef8ba1ea
SHA256cfc750f00d3392a0b59edad27966ef6d8fc4b715a504b504a3c1bcb295b203ee
SHA512c9e78b2563467df84d570ae703864059f81444a53c7f6e739fea5561e0458475ae61ae7336097d514ff2f85ab583a82e1f9e58853b2d1f7568e6c15c7319e497
-
Filesize
9KB
MD5ab101f38562c8545a641e95172c354b4
SHA1ec47ac5449f6ee4b14f6dd7ddde841a3e723e567
SHA2563cdf3e24c87666ed5c582b8b028c01ee6ac16d5a9b8d8d684ae67605376786ea
SHA51272d4b6dc439f40b7d68b03353a748fc3ad7ed10b0401741c5030705d9b1adef856406075e9ce4f1a08e4345a16e1c759f636c38ad92a57ef369867a9533b7037
-
Filesize
4KB
MD5e4ec95271ff1bcebab49bdfed6817a22
SHA12c03e97f4773aea80ecdb98a1482e5896fe4677b
SHA256ee1c06692a757473737b0ebdef16f77b63afac864d0890022d905e4873737dd6
SHA512771a527133806307a1b17b7e956d6a3c16e9bc675bf084b43204ae784a057dac2726dbf90645692876043a4e7365ba8825c167621fde4760c79cd84679e2aa3d
-
Filesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
Filesize
9KB
MD5ab101f38562c8545a641e95172c354b4
SHA1ec47ac5449f6ee4b14f6dd7ddde841a3e723e567
SHA2563cdf3e24c87666ed5c582b8b028c01ee6ac16d5a9b8d8d684ae67605376786ea
SHA51272d4b6dc439f40b7d68b03353a748fc3ad7ed10b0401741c5030705d9b1adef856406075e9ce4f1a08e4345a16e1c759f636c38ad92a57ef369867a9533b7037