Analysis
-
max time kernel
46s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
14-04-2023 18:06
Static task
static1
Behavioral task
behavioral1
Sample
arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe
Resource
win10v2004-20230221-en
General
-
Target
arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe
-
Size
115.8MB
-
MD5
b4acd42805fd85f25faf765253949353
-
SHA1
0645e0951235232e76106b93efa338e650a27b95
-
SHA256
4a92a9ec3bf5456ed626b3188f470e28acfcb070210ac0e0f972f5f40aae1405
-
SHA512
b84a92f09a0614b757f75d2efbbf2c97782291dba56c8640c9e3d3a017779144d520b201e4f43a90672805875feb591e0ef011a3b53d1f405c6811234c369b4c
-
SSDEEP
98304:gUtYLUTjaS0uDxljStdqxVNkcc4B7mxqY+vYrm1wEiJy2LiqUuH7MC:gU60/OUkMSDQMdiqUuH
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe 1304 arc_digital_adjuntosALDHDOQDALCCMIOfsrzq.exe