Resubmissions
28-02-2022 15:41
220228-s4qs8seeg3 1012-06-2021 09:55
210612-f7rmdwaays 1012-06-2021 09:51
210612-kcegep1ef2 7Analysis
-
max time kernel
299s -
max time network
292s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
12-06-2021 09:55
Static task
static1
Behavioral task
behavioral1
Sample
installer.run
Resource
win7v20210410
Behavioral task
behavioral2
Sample
installer.run
Resource
macos
Behavioral task
behavioral3
Sample
installer.run
Resource
ubuntu-amd64
Behavioral task
behavioral4
Sample
installer.run
Resource
android-x64-arm64
General
-
Target
installer.run
-
Size
99KB
-
MD5
d4b45f4ab1ec5616026e8fbed2431be8
-
SHA1
28ecd4944f37bb8f9b7dfd1d486f7c9c027166d0
-
SHA256
819eab9afaca5601ffd83c85a7edd6cd1899e6b431ab8e901a385065912adeb1
-
SHA512
2026b561dce762930e3c6a7179d509efb7be482281111f65461328ed6da5c04e1bb7a7bf3f5cd883920a2cdd50e5c72b1c500d6f4963174792f0c183070b0771
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\run_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\run_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\.run\ = "run_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\run_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\run_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\run_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\run_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1460 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1460 AcroRd32.exe 1460 AcroRd32.exe 1460 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 792 wrote to memory of 1156 792 cmd.exe 27 PID 792 wrote to memory of 1156 792 cmd.exe 27 PID 792 wrote to memory of 1156 792 cmd.exe 27 PID 1156 wrote to memory of 1460 1156 rundll32.exe 31 PID 1156 wrote to memory of 1460 1156 rundll32.exe 31 PID 1156 wrote to memory of 1460 1156 rundll32.exe 31 PID 1156 wrote to memory of 1460 1156 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\installer.run1⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\installer.run2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\installer.run"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1460
-
-