Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-01-2022 19:04
Static task
static1
Behavioral task
behavioral1
Sample
f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083.bin
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083.bin
Resource
win10v2004-en-20220112
General
-
Target
f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083.bin
-
Size
1.8MB
-
MD5
085b8046d0c3958d78751b6825052d66
-
SHA1
6116a5b0c0b6c147a2c715aad2eb1cd082941715
-
SHA256
f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083
-
SHA512
a1aa3f2c17ae5738285506a990ed4ff83c5cfbc38492c3774a2ef246a26e5ec41aacee62c869420b00557af56831cb88ce5449ee762c7ab5c22245f024192213
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\bin_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\bin_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\.bin rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\bin_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 548 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 548 AcroRd32.exe 548 AcroRd32.exe 548 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 836 wrote to memory of 652 836 cmd.exe rundll32.exe PID 836 wrote to memory of 652 836 cmd.exe rundll32.exe PID 836 wrote to memory of 652 836 cmd.exe rundll32.exe PID 652 wrote to memory of 548 652 rundll32.exe AcroRd32.exe PID 652 wrote to memory of 548 652 rundll32.exe AcroRd32.exe PID 652 wrote to memory of 548 652 rundll32.exe AcroRd32.exe PID 652 wrote to memory of 548 652 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083.bin1⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\f7a038f9b91c40e9d67f4168997d7d8c12c2d27cd9e36c413dd021796a24e083.bin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:548
-
-