Resubmissions

28-04-2023 12:48

230428-p1x7csfh5t 7

20-04-2023 15:33

230420-sy83macg2t 7

17-04-2023 19:44

230417-ygbnpafh23 3

Analysis

  • max time kernel
    130s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2023 19:44

General

  • Target

    3c03fed6b2e374d6d4d3d8a0606a390fc010974d6d3b75be52a84663e4ba9a35.exe

  • Size

    118.7MB

  • MD5

    312ad9d4aa8dfe07123e52c15cebfa21

  • SHA1

    e43b6ab1e9d108ca48cafbea030b7a858ab18e26

  • SHA256

    3c03fed6b2e374d6d4d3d8a0606a390fc010974d6d3b75be52a84663e4ba9a35

  • SHA512

    18a8328f33ac06967f895090c6fdd1a53eceb2b489a208785a10eb0a3c893c4d4fc6a7e967cdb055be70c6590d38d2557051672e6b3266886528a63ff246cf43

  • SSDEEP

    3145728:fh2IvUOIUgLZEBFpdVqp0x5TGXREIAzaR/enL0AdXPmZzeTj+C:FDeZEfVq+jGXQIRE3P

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c03fed6b2e374d6d4d3d8a0606a390fc010974d6d3b75be52a84663e4ba9a35.exe
    "C:\Users\Admin\AppData\Local\Temp\3c03fed6b2e374d6d4d3d8a0606a390fc010974d6d3b75be52a84663e4ba9a35.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads