Resubmissions
30/09/2022, 10:35
220930-mm59psebhl 629/09/2022, 13:01
220929-p9fcxaahd8 617/12/2021, 18:47
211217-xfnq7aegfp 1016/12/2021, 14:14
211216-rj2vbsccc8 1016/12/2021, 14:07
211216-re4s5achhj 10Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16/12/2021, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
RL.exe
Resource
win7-en-20211208
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RL.exe
Resource
win10-en-20211208
0 signatures
0 seconds
General
-
Target
RL.exe
-
Size
333KB
-
MD5
981f7a4bb2592bffcbdf543a742cb1a2
-
SHA1
64d97d061583e343ce7a02a4b905281d95ff0bba
-
SHA256
4e64776e3c8b0f6e432fb300b8f7d95b10d1a8ec223d15e1462d64cdde555c50
-
SHA512
b0be15a1d8a80506de3b615f1c5713a9acaf46b9577187f6c1dbfa6539b0641ebc4c83178a3c4bed2342d5e8bea4c910b30853d1e91b87b824d4f9173b46397b
Score
10/10
Malware Config
Extracted
Path
C:\Readme.txt
Ransom Note
[+] RL Wana-XD ! [+]
Don't worry, you can return all your files!
The only method of recovering files is to purchase decrypt tool and unique key for you.
Please note that you'll never restore your data without payment.
To get this software you need write on our e-mail:
[email protected]
Reserve e-mail address to contact us:
[email protected]
Your personal ID:
gWnhMKpcu+h+GkPPsy@NsPD8dhmeGV
[KEEP IT]
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Program crash 1 IoCs
pid pid_target Process procid_target 1868 1584 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1868 WerFault.exe 1868 WerFault.exe 1868 WerFault.exe 1868 WerFault.exe 1868 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1584 RL.exe Token: SeDebugPrivilege 1868 WerFault.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1868 1584 RL.exe 28 PID 1584 wrote to memory of 1868 1584 RL.exe 28 PID 1584 wrote to memory of 1868 1584 RL.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\RL.exe"C:\Users\Admin\AppData\Local\Temp\RL.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1584 -s 12962⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-