Overview
overview
3Static
static
3A09 (1).pdf
windows7_x64
1A09 (1).pdf
windows10-2004_x64
1BANK ID 1~2-.jpg
windows7_x64
1BANK ID 1~2-.jpg
windows10-2004_x64
3BANK ID-.jpg
windows7_x64
1BANK ID-.jpg
windows10-2004_x64
3BRS.pdf
windows7_x64
1BRS.pdf
windows10-2004_x64
1DOC.pdf
windows7_x64
1DOC.pdf
windows10-2004_x64
1E id (1).pdf
windows7_x64
1E id (1).pdf
windows10-2004_x64
1IAP-.jpg
windows7_x64
3IAP-.jpg
windows10-2004_x64
3PAN B-.jpg
windows7_x64
1PAN B-.jpg
windows10-2004_x64
3PAN-.jpg
windows7_x64
3PAN-.jpg
windows10-2004_x64
3Proprietor sign.jpg
windows7_x64
1Proprietor sign.jpg
windows10-2004_x64
3UID 1-.jpg
windows7_x64
1UID 1-.jpg
windows10-2004_x64
3UID-.jpg
windows7_x64
3UID-.jpg
windows10-2004_x64
3bankaccount.pdf
windows7_x64
1bankaccount.pdf
windows10-2004_x64
1download.jpg
windows7_x64
3download.jpg
windows10-2004_x64
3fw8imy.pdf
windows7_x64
1fw8imy.pdf
windows10-2004_x64
1id -f.jpg
windows7_x64
1id -f.jpg
windows10-2004_x64
3Analysis
-
max time kernel
4294183s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
31-03-2022 04:57
Behavioral task
behavioral1
Sample
A09 (1).pdf
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
A09 (1).pdf
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
BANK ID 1~2-.jpg
Resource
win7-20220311-en
Behavioral task
behavioral4
Sample
BANK ID 1~2-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
BANK ID-.jpg
Resource
win7-20220310-en
Behavioral task
behavioral6
Sample
BANK ID-.jpg
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
BRS.pdf
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
BRS.pdf
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
DOC.pdf
Resource
win7-20220311-en
Behavioral task
behavioral10
Sample
DOC.pdf
Resource
win10v2004-20220310-en
Behavioral task
behavioral11
Sample
E id (1).pdf
Resource
win7-20220311-en
Behavioral task
behavioral12
Sample
E id (1).pdf
Resource
win10v2004-20220310-en
Behavioral task
behavioral13
Sample
IAP-.jpg
Resource
win7-20220311-en
Behavioral task
behavioral14
Sample
IAP-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral15
Sample
PAN B-.jpg
Resource
win7-20220311-en
Behavioral task
behavioral16
Sample
PAN B-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral17
Sample
PAN-.jpg
Resource
win7-20220310-en
Behavioral task
behavioral18
Sample
PAN-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral19
Sample
Proprietor sign.jpg
Resource
win7-20220311-en
Behavioral task
behavioral20
Sample
Proprietor sign.jpg
Resource
win10v2004-20220310-en
Behavioral task
behavioral21
Sample
UID 1-.jpg
Resource
win7-20220311-en
Behavioral task
behavioral22
Sample
UID 1-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral23
Sample
UID-.jpg
Resource
win7-20220310-en
Behavioral task
behavioral24
Sample
UID-.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral25
Sample
bankaccount.pdf
Resource
win7-20220310-en
Behavioral task
behavioral26
Sample
bankaccount.pdf
Resource
win10v2004-20220310-en
Behavioral task
behavioral27
Sample
download.jpg
Resource
win7-20220311-en
Behavioral task
behavioral28
Sample
download.jpg
Resource
win10v2004-en-20220113
Behavioral task
behavioral29
Sample
fw8imy.pdf
Resource
win7-20220310-en
Behavioral task
behavioral30
Sample
fw8imy.pdf
Resource
win10v2004-en-20220113
Behavioral task
behavioral31
Sample
id -f.jpg
Resource
win7-20220311-en
Behavioral task
behavioral32
Sample
id -f.jpg
Resource
win10v2004-en-20220113
General
-
Target
PAN-.jpg
-
Size
155KB
-
MD5
ceceb45ea0cf4d5010772ebaa49d2d8d
-
SHA1
adc39a03199c295521e496f0d048880d1eda036b
-
SHA256
68ee51fb589fc13ea759c105a5220167566a7517e9c8040b63b19387019f6030
-
SHA512
896d45f76db016e0c3c8f55b0b8372f8c3ce4c44b4b82cf663b0fab197e36f6c86604f23c501e877c9350d72e5dcf99cbf255cf5145f79a4c96ae072ed388732
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 1452 rundll32.exe
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1452-54-0x000007FEFC121000-0x000007FEFC123000-memory.dmpFilesize
8KB