Analysis
-
max time kernel
28s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 22:06
Static task
static1
Behavioral task
behavioral1
Sample
205841ee849590d364e2879181f0422863a6b2092396b640babab35ace0c3fbf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
205841ee849590d364e2879181f0422863a6b2092396b640babab35ace0c3fbf.exe
Resource
win10v2004-20230220-en
General
-
Target
205841ee849590d364e2879181f0422863a6b2092396b640babab35ace0c3fbf.exe
-
Size
847KB
-
MD5
7013c52afbaabc15f9256d1e00f541ed
-
SHA1
a5294ee090f72b8cbcf8d3feff404d4fe317a5ef
-
SHA256
205841ee849590d364e2879181f0422863a6b2092396b640babab35ace0c3fbf
-
SHA512
f40ee93f3172a43a9041260b732bed4c211aae63d4fc9d22ea4ea265ee1c244f8f499b35ae1b5645b9d68fcfaf4bd22cf3b150364125963155556aeb10dc19c7
-
SSDEEP
24576:MPxdTqluSyOB6L29/DPyCJgn7zXTmvmeHoknl:M5uySpPk/XT6mrknl
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2028 205841ee849590d364e2879181f0422863a6b2092396b640babab35ace0c3fbf.exe