Resubmissions
30/09/2022, 10:35
220930-mm59psebhl 629/09/2022, 13:01
220929-p9fcxaahd8 617/12/2021, 18:47
211217-xfnq7aegfp 1016/12/2021, 14:14
211216-rj2vbsccc8 1016/12/2021, 14:07
211216-re4s5achhj 10Analysis
-
max time kernel
236s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
16/12/2021, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
RL.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
RL.exe
Resource
win10-en-20211208
General
-
Target
RL.exe
-
Size
333KB
-
MD5
981f7a4bb2592bffcbdf543a742cb1a2
-
SHA1
64d97d061583e343ce7a02a4b905281d95ff0bba
-
SHA256
4e64776e3c8b0f6e432fb300b8f7d95b10d1a8ec223d15e1462d64cdde555c50
-
SHA512
b0be15a1d8a80506de3b615f1c5713a9acaf46b9577187f6c1dbfa6539b0641ebc4c83178a3c4bed2342d5e8bea4c910b30853d1e91b87b824d4f9173b46397b
Malware Config
Extracted
C:\Readme.txt
Signatures
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: RL.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings RL.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2000 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3692 RL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RL.exe"C:\Users\Admin\AppData\Local\Temp\RL.exe"1⤵
- Enumerates connected drives
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Readme.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2000
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2220