Overview
overview
3Static
static
.runner/boner
linux_amd64
.runner/cosynus
linux_amd64
.runner/main
linux_amd64
.runner/pscan2
linux_amd64
.runner/run
linux_amd64
.runner/run
linux_mipsel
.runner/run
linux_mips
.runner/run
linux_armhf
.runner/send_vuln.py
windows7_x64
3.runner/send_vuln.py
windows10_x64
3Analysis
-
max time kernel
151s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
30-11-2021 22:36
Static task
static1
Behavioral task
behavioral1
Sample
.runner/boner
Resource
ubuntu1804-amd64-en-20211025
Behavioral task
behavioral2
Sample
.runner/cosynus
Resource
ubuntu1804-amd64-en-20211025
Behavioral task
behavioral3
Sample
.runner/main
Resource
ubuntu1804-amd64-en-20211025
Behavioral task
behavioral4
Sample
.runner/pscan2
Resource
ubuntu1804-amd64-en-20211025
Behavioral task
behavioral5
Sample
.runner/run
Resource
ubuntu1804-amd64-en-20211025
Behavioral task
behavioral6
Sample
.runner/run
Resource
debian9-mipsel-en-20211025
Behavioral task
behavioral7
Sample
.runner/run
Resource
debian9-mipsbe-en-20211025
Behavioral task
behavioral8
Sample
.runner/run
Resource
debian9-armhf-en-20211025
Behavioral task
behavioral9
Sample
.runner/send_vuln.py
Resource
win7-en-20211014
Behavioral task
behavioral10
Sample
.runner/send_vuln.py
Resource
win10-en-20211014
General
-
Target
.runner/send_vuln.py
-
Size
1KB
-
MD5
dbb01b6d40b0efa19bd887640685e3b6
-
SHA1
638108b2217b21843ba7f1c80a95f756e5e2310d
-
SHA256
6988f670c3cee552792797e7f0aea6e93516bf278b29d3ddce13cedb6c261f3b
-
SHA512
89149ce817b1c19c531c08e53aabe3964148ac24ccfbb56d323d3255db64f42f93ce4e0b213d996c6d84d4bb5f6930a74d3cccb9f467acbe86077071ab6ca03b
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 812 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 812 AcroRd32.exe 812 AcroRd32.exe 812 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1520 wrote to memory of 1336 1520 cmd.exe 28 PID 1520 wrote to memory of 1336 1520 cmd.exe 28 PID 1520 wrote to memory of 1336 1520 cmd.exe 28 PID 1336 wrote to memory of 812 1336 rundll32.exe 30 PID 1336 wrote to memory of 812 1336 rundll32.exe 30 PID 1336 wrote to memory of 812 1336 rundll32.exe 30 PID 1336 wrote to memory of 812 1336 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\.runner\send_vuln.py1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\.runner\send_vuln.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\.runner\send_vuln.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:812
-
-