Overview
overview
10Static
static
10Log4J Malw...26f.7z
windows7_x64
3Log4J Malw...26f.7z
windows10-2004_x64
390ee1a8e8f...c7d26f
linux_amd64
6e25ad0310...8b.elf
linux_amd64
7e9663f872...512.sh
linux_amd64
7e9663f872...512.sh
linux_armhf
7e9663f872...512.sh
linux_mips
7e9663f872...512.sh
linux_mipsel
10fad59b07...2b4513
linux_amd64
10fad59b07...2b4513
linux_armhf
10fad59b07...2b4513
linux_mips
10fad59b07...2b4513
linux_mipsel
3f6120ca0f...d26.sh
windows7_x64
33f6120ca0f...d26.sh
windows10-2004_x64
3776c341504...abcc00
linux_amd64
15e7942ebf...79b36b
linux_mips
e7c5b3de93...cc0e82
linux_amd64
Analysis
-
max time kernel
49s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
13/05/2022, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
Log4J Malware/Elknot/90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Log4J Malware/Elknot/90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral4
Sample
6e25ad03103a1a972b78c642bac09060fa79c460011dc5748cbb433cc459938b.elf
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral5
Sample
7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral6
Sample
7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512.sh
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral7
Sample
7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512.sh
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
7e9663f87255ae2ff78eb882efe8736431368f341849fec000543f027bdb4512.sh
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral9
Sample
10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral10
Sample
10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral11
Sample
10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral12
Sample
10fad59b071db09aafcb7f40e775f28180aed182786557e9ee7f2f2e332b4513
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral13
Sample
3f6120ca0ff7cf6389ce392d4018a5e40b131a083b071187bf54c900e2edad26.sh
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
3f6120ca0ff7cf6389ce392d4018a5e40b131a083b071187bf54c900e2edad26.sh
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
776c341504769aa67af7efc5acc66c338dab5684a8579134d3f23165c7abcc00
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral16
Sample
15e7942ebf88a51346d3a5975bb1c2d87996799e6255db9e92aed798d279b36b
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral17
Sample
e7c5b3de93a3184dc99c98c7f45e6ff5f6881b15d4a56c144e2e53e96dcc0e82
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
Log4J Malware/Elknot/90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z
-
Size
362KB
-
MD5
86a016b9b15f8b409b1b022069c1eb42
-
SHA1
fbed2f40fac21a2ef654026e37eafb82fb9f4ca5
-
SHA256
f43aa2f2aad2308deeb2d2f5f01280f1a544412d8805422a7714d9bf758c4fe1
-
SHA512
49d7c6b2b64903b149c0337a7ee7463a6e6fa8abcf3a6d2c7456f854b5f8b53535280d936a2499d803e1258b25994ed805ae90f197ba18ad81301627c7c26430
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\.7z\ = "7z_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\7z_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\7z_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\7z_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\7z_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\7z_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\7z_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000_CLASSES\.7z rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1528 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1528 AUDIODG.EXE Token: 33 1528 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1528 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1004 AcroRd32.exe 1004 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1764 1580 cmd.exe 29 PID 1580 wrote to memory of 1764 1580 cmd.exe 29 PID 1580 wrote to memory of 1764 1580 cmd.exe 29 PID 1764 wrote to memory of 1004 1764 rundll32.exe 30 PID 1764 wrote to memory of 1004 1764 rundll32.exe 30 PID 1764 wrote to memory of 1004 1764 rundll32.exe 30 PID 1764 wrote to memory of 1004 1764 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Log4J Malware\Elknot\90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z"1⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Log4J Malware\Elknot\90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Log4J Malware\Elknot\90ee1a8e8f0ea5085b83b8efe174674a93260b599729bf53e1b140e2acc7d26f.7z"3⤵
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x55c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1528