Analysis
-
max time kernel
112s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2023 04:06
Behavioral task
behavioral1
Sample
Invoice No 3031.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Invoice No 3031.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Invoice No 3031.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Invoice No 3031.exe
Resource
win10v2004-20230220-en
General
-
Target
Invoice No 3031.exe
-
Size
392KB
-
MD5
834d27a3338f27c774f1ac360bd811a2
-
SHA1
8b7c89a775b2cbe13b254ca062eea65f7c2ac6d6
-
SHA256
30dfdf5dc70837a7d9a22bb1128100ba462ef69d3cf97eaa65e7104dd19ce6d7
-
SHA512
64b75de52045819d4579c3fc35dd8364669f3564ae3aea63a939bf38f6f85636fe3b9aa719969989b9f4f1d91e1366b329ddd270aae60e5b3f091de46bd09c08
-
SSDEEP
6144:NioDjSNztkmcu1S4GlA9jmHv/VCSY3hw9lMbk6u1QMS0y+lqiHTonWryFDYR:wK46A9jmP/uhu/yMS08CkntxYR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Invoice No 3031.exepid Process 620 Invoice No 3031.exe 620 Invoice No 3031.exe 620 Invoice No 3031.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Invoice No 3031.exedescription pid Process procid_target PID 620 wrote to memory of 3172 620 Invoice No 3031.exe 85 PID 620 wrote to memory of 3172 620 Invoice No 3031.exe 85 PID 620 wrote to memory of 3172 620 Invoice No 3031.exe 85