Resubmissions
12-08-2021 18:33
210812-z3kcywcakj 826-07-2021 16:00
210726-pcynvcchwn 1025-07-2021 18:10
210725-m5zdsbkjn2 8Analysis
-
max time kernel
148s -
max time network
204s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
26-07-2021 16:00
Static task
static1
Behavioral task
behavioral1
Sample
Star-Wars-Battlefron_330757428.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Star-Wars-Battlefron_330757428.exe
Resource
win10v20210410
General
-
Target
Star-Wars-Battlefron_330757428.exe
-
Size
7.4MB
-
MD5
1f916117907696b1166fd3b79e9905f9
-
SHA1
50b83e0dcc2205b8e153ba5898498ef5ee01b943
-
SHA256
6eafa7c61e42d196916baffa8392658241fe214d13edefeeffde6aa0619e3507
-
SHA512
b472b663c0536f2ee6af7ce2c0d8450fbbbc0c32ceef8e22d66f600a19a92c60e5763ce481f3d69f146c4fcd39c75da8d904a081d60d3d2f0aa2d0efe7789048
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
Star-Wars-Battlefron_330757428.tmpSEHRecoveryToolboxLauncher.exepid process 1768 Star-Wars-Battlefron_330757428.tmp 1232 SEHRecoveryToolboxLauncher.exe -
Loads dropped DLL 3 IoCs
Processes:
Star-Wars-Battlefron_330757428.exeStar-Wars-Battlefron_330757428.tmppid process 528 Star-Wars-Battlefron_330757428.exe 1768 Star-Wars-Battlefron_330757428.tmp 1768 Star-Wars-Battlefron_330757428.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 21 IoCs
Processes:
Star-Wars-Battlefron_330757428.tmpdescription ioc process File created C:\Program Files (x86)\SEH Recovery Toolbox\is-0VRJB.tmp Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-FQ831.tmp Star-Wars-Battlefron_330757428.tmp File opened for modification C:\Program Files (x86)\SEH Recovery Toolbox\cc3260.dll Star-Wars-Battlefron_330757428.tmp File opened for modification C:\Program Files (x86)\SEH Recovery Toolbox\libeay32.dll Star-Wars-Battlefron_330757428.tmp File opened for modification C:\Program Files (x86)\SEH Recovery Toolbox\RAR Recovery Toolbox.chm Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-RUH33.tmp Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-DS9BM.tmp Star-Wars-Battlefron_330757428.tmp File opened for modification C:\Program Files (x86)\SEH Recovery Toolbox\prRarRecoveryToolboxLib5.dll Star-Wars-Battlefron_330757428.tmp File opened for modification C:\Program Files (x86)\SEH Recovery Toolbox\ssleay32.dll Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\unins000.dat Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-Q7CSU.tmp Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-HHR62.tmp Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-D4457.tmp Star-Wars-Battlefron_330757428.tmp File opened for modification C:\Program Files (x86)\SEH Recovery Toolbox\prRarRecoveryToolboxLib.dll Star-Wars-Battlefron_330757428.tmp File opened for modification C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-8V1I2.tmp Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-RC6PA.tmp Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-59RDQ.tmp Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-8946U.tmp Star-Wars-Battlefron_330757428.tmp File created C:\Program Files (x86)\SEH Recovery Toolbox\is-C70KR.tmp Star-Wars-Battlefron_330757428.tmp File opened for modification C:\Program Files (x86)\SEH Recovery Toolbox\unins000.dat Star-Wars-Battlefron_330757428.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Star-Wars-Battlefron_330757428.tmpSEHRecoveryToolboxLauncher.exepid process 1768 Star-Wars-Battlefron_330757428.tmp 1768 Star-Wars-Battlefron_330757428.tmp 1232 SEHRecoveryToolboxLauncher.exe 1232 SEHRecoveryToolboxLauncher.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Star-Wars-Battlefron_330757428.tmppid process 1768 Star-Wars-Battlefron_330757428.tmp -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Star-Wars-Battlefron_330757428.exeStar-Wars-Battlefron_330757428.tmpdescription pid process target process PID 528 wrote to memory of 1768 528 Star-Wars-Battlefron_330757428.exe Star-Wars-Battlefron_330757428.tmp PID 528 wrote to memory of 1768 528 Star-Wars-Battlefron_330757428.exe Star-Wars-Battlefron_330757428.tmp PID 528 wrote to memory of 1768 528 Star-Wars-Battlefron_330757428.exe Star-Wars-Battlefron_330757428.tmp PID 528 wrote to memory of 1768 528 Star-Wars-Battlefron_330757428.exe Star-Wars-Battlefron_330757428.tmp PID 528 wrote to memory of 1768 528 Star-Wars-Battlefron_330757428.exe Star-Wars-Battlefron_330757428.tmp PID 528 wrote to memory of 1768 528 Star-Wars-Battlefron_330757428.exe Star-Wars-Battlefron_330757428.tmp PID 528 wrote to memory of 1768 528 Star-Wars-Battlefron_330757428.exe Star-Wars-Battlefron_330757428.tmp PID 1768 wrote to memory of 1232 1768 Star-Wars-Battlefron_330757428.tmp SEHRecoveryToolboxLauncher.exe PID 1768 wrote to memory of 1232 1768 Star-Wars-Battlefron_330757428.tmp SEHRecoveryToolboxLauncher.exe PID 1768 wrote to memory of 1232 1768 Star-Wars-Battlefron_330757428.tmp SEHRecoveryToolboxLauncher.exe PID 1768 wrote to memory of 1232 1768 Star-Wars-Battlefron_330757428.tmp SEHRecoveryToolboxLauncher.exe PID 1768 wrote to memory of 1232 1768 Star-Wars-Battlefron_330757428.tmp SEHRecoveryToolboxLauncher.exe PID 1768 wrote to memory of 1232 1768 Star-Wars-Battlefron_330757428.tmp SEHRecoveryToolboxLauncher.exe PID 1768 wrote to memory of 1232 1768 Star-Wars-Battlefron_330757428.tmp SEHRecoveryToolboxLauncher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe"C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-GFJL0.tmp\Star-Wars-Battlefron_330757428.tmp"C:\Users\Admin\AppData\Local\Temp\is-GFJL0.tmp\Star-Wars-Battlefron_330757428.tmp" /SL5="$50156,7020769,1072640,C:\Users\Admin\AppData\Local\Temp\Star-Wars-Battlefron_330757428.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe"C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exe" Star-Wars-Battlefron_330757428.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exeMD5
56f12ac950b313c857c4de27ed86d334
SHA12fb150324007af4b7790af628c1ae0ccadf01b82
SHA256caca1e988b91716e899e5a37d2fa97c17f0d5004cb751800e84c966291136f19
SHA51208057cc1d38a53a8283acfc00ce4ed443afda1a8d7baa343f988f785df37402c8f4929d940c2d83a13fc43905dee3f323fbc0ad5fcfcb4346d8a156d1a722d86
-
C:\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exeMD5
56f12ac950b313c857c4de27ed86d334
SHA12fb150324007af4b7790af628c1ae0ccadf01b82
SHA256caca1e988b91716e899e5a37d2fa97c17f0d5004cb751800e84c966291136f19
SHA51208057cc1d38a53a8283acfc00ce4ed443afda1a8d7baa343f988f785df37402c8f4929d940c2d83a13fc43905dee3f323fbc0ad5fcfcb4346d8a156d1a722d86
-
C:\Users\Admin\AppData\Local\Temp\is-GFJL0.tmp\Star-Wars-Battlefron_330757428.tmpMD5
1af5a1ed59fcb0e2f61839fae950a2f8
SHA1917429dd437ff355c3061f25c4d1068a95420d2c
SHA256b7767fd4addb557368ff1e605d358e0e36d39e526dc72bdd3eb28ff78a302ef9
SHA512dc5e3bb735d728ab4d6dc50809e9f156c92e00dfaea68d78f7e7c7d4c22c6e351a46b256422401b9758273bbd04b9848ac7e8fde315d817a34c473dd4d4ae24e
-
C:\Users\Admin\AppData\Local\Temp\is-GFJL0.tmp\Star-Wars-Battlefron_330757428.tmpMD5
1af5a1ed59fcb0e2f61839fae950a2f8
SHA1917429dd437ff355c3061f25c4d1068a95420d2c
SHA256b7767fd4addb557368ff1e605d358e0e36d39e526dc72bdd3eb28ff78a302ef9
SHA512dc5e3bb735d728ab4d6dc50809e9f156c92e00dfaea68d78f7e7c7d4c22c6e351a46b256422401b9758273bbd04b9848ac7e8fde315d817a34c473dd4d4ae24e
-
\Program Files (x86)\SEH Recovery Toolbox\SEHRecoveryToolboxLauncher.exeMD5
56f12ac950b313c857c4de27ed86d334
SHA12fb150324007af4b7790af628c1ae0ccadf01b82
SHA256caca1e988b91716e899e5a37d2fa97c17f0d5004cb751800e84c966291136f19
SHA51208057cc1d38a53a8283acfc00ce4ed443afda1a8d7baa343f988f785df37402c8f4929d940c2d83a13fc43905dee3f323fbc0ad5fcfcb4346d8a156d1a722d86
-
\Users\Admin\AppData\Local\Temp\is-BUQ23.tmp\_isetup\_isdecmp.dllMD5
77d6d961f71a8c558513bed6fd0ad6f1
SHA1122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a
SHA2565da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0
SHA512b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a
-
\Users\Admin\AppData\Local\Temp\is-GFJL0.tmp\Star-Wars-Battlefron_330757428.tmpMD5
1af5a1ed59fcb0e2f61839fae950a2f8
SHA1917429dd437ff355c3061f25c4d1068a95420d2c
SHA256b7767fd4addb557368ff1e605d358e0e36d39e526dc72bdd3eb28ff78a302ef9
SHA512dc5e3bb735d728ab4d6dc50809e9f156c92e00dfaea68d78f7e7c7d4c22c6e351a46b256422401b9758273bbd04b9848ac7e8fde315d817a34c473dd4d4ae24e
-
memory/528-66-0x0000000000400000-0x0000000000514000-memory.dmpFilesize
1.1MB
-
memory/528-59-0x0000000075FF1000-0x0000000075FF3000-memory.dmpFilesize
8KB
-
memory/1232-71-0x0000000000000000-mapping.dmp
-
memory/1232-75-0x0000000000400000-0x000000000170A000-memory.dmpFilesize
19.0MB
-
memory/1232-76-0x0000000000390000-0x0000000000391000-memory.dmpFilesize
4KB
-
memory/1768-67-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1768-68-0x0000000074501000-0x0000000074503000-memory.dmpFilesize
8KB
-
memory/1768-62-0x0000000000000000-mapping.dmp