Analysis
-
max time kernel
476s -
max time network
539s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2025, 09:58
Static task
static1
Behavioral task
behavioral1
Sample
TMmap_1.0.4.4_D24.48.zip
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
TMmap_1.0.4.4_D24.48/Readme.txt
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
TMmap_1.0.4.4_D24.48/TMSoft.TMMAP-DEMO_AjrQSf7iMI.key
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
TMmap_1.0.4.4_D24.48/TMmap_x1.0.4.4_D24.48.msi
Resource
win11-20250314-en
General
-
Target
TMmap_1.0.4.4_D24.48/Readme.txt
-
Size
786B
-
MD5
7540058863168bb76926d5b7d81daaac
-
SHA1
a060c908439111ac23f6a069da1d5b06b4687a59
-
SHA256
2c3f27ef0130aa71613707cb398a26493c4679d4c4235f7c3b283a529b17a9b1
-
SHA512
c44fdf2933b72d7debe226bab46168bc77cf6d63c537480a637058240943fe0dfb3659517720e592202fc21760dc30e3c61b74883ed51d9eeff88b8b51e51088
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3712238951-2226310826-298817577-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3840 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3840 1884 cmd.exe 83 PID 1884 wrote to memory of 3840 1884 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\TMmap_1.0.4.4_D24.48\Readme.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\TMmap_1.0.4.4_D24.48\Readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3840
-