Overview
overview
3Static
static
erxczzxEr0...ore.js
windows7_x64
1erxczzxEr0...ore.js
windows10-2004_x64
1erxczzxEr0...rap.js
windows7_x64
1erxczzxEr0...rap.js
windows10-2004_x64
1erxczzxEr0...een.js
windows7_x64
1erxczzxEr0...een.js
windows10-2004_x64
1erxczzxEr0...x.html
windows7_x64
1erxczzxEr0...x.html
windows10-2004_x64
1erxczzxEr0...ght.js
windows7_x64
1erxczzxEr0...ght.js
windows10-2004_x64
1erxczzxEr0...ain.js
windows7_x64
1erxczzxEr0...ain.js
windows10-2004_x64
1erxczzxEr0...zr1.js
windows7_x64
1erxczzxEr0...zr1.js
windows10-2004_x64
1erxczzxEr0...es.jpg
windows7_x64
3erxczzxEr0...es.jpg
windows10-2004_x64
3erxczzxEr0...ore.js
windows7_x64
1erxczzxEr0...ore.js
windows10-2004_x64
1erxczzxEr0...rap.js
windows7_x64
1erxczzxEr0...rap.js
windows10-2004_x64
1erxczzxEr0...een.js
windows7_x64
1erxczzxEr0...een.js
windows10-2004_x64
1erxczzxEr0...x.html
windows7_x64
1erxczzxEr0...x.html
windows10-2004_x64
1erxczzxEr0...ght.js
windows7_x64
1erxczzxEr0...ght.js
windows10-2004_x64
1erxczzxEr0...ain.js
windows7_x64
1erxczzxEr0...ain.js
windows10-2004_x64
1erxczzxEr0...zr1.js
windows7_x64
1erxczzxEr0...zr1.js
windows10-2004_x64
1erxczzxEr0...s1.png
windows7_x64
3erxczzxEr0...s1.png
windows10-2004_x64
3Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-06-2022 17:18
Static task
static1
Behavioral task
behavioral1
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/before.js
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/before.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral3
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/bootstrap.js
Resource
win7-20220414-en
Behavioral task
behavioral4
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/bootstrap.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral5
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/fullscreen.js
Resource
win7-20220414-en
Behavioral task
behavioral6
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/fullscreen.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral7
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/index.html
Resource
win7-20220414-en
Behavioral task
behavioral8
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral9
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/light.js
Resource
win7-20220414-en
Behavioral task
behavioral10
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/light.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral11
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/main.js
Resource
win7-20220414-en
Behavioral task
behavioral12
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/main.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral13
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/modernizr1.js
Resource
win7-20220414-en
Behavioral task
behavioral14
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/modernizr1.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral15
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/virus-images.jpg
Resource
win7-20220414-en
Behavioral task
behavioral16
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/virus-images.jpg
Resource
win10v2004-20220414-en
Behavioral task
behavioral17
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/before.js
Resource
win7-20220414-en
Behavioral task
behavioral18
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/before.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral19
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/bootstrap.js
Resource
win7-20220414-en
Behavioral task
behavioral20
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/bootstrap.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral21
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/fullscreen.js
Resource
win7-20220414-en
Behavioral task
behavioral22
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/fullscreen.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral23
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/index.html
Resource
win7-20220414-en
Behavioral task
behavioral24
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/index.html
Resource
win10v2004-20220414-en
Behavioral task
behavioral25
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/light.js
Resource
win7-20220414-en
Behavioral task
behavioral26
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/light.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral27
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/main.js
Resource
win7-20220414-en
Behavioral task
behavioral28
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/main.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral29
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/modernizr1.js
Resource
win7-20220414-en
Behavioral task
behavioral30
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/modernizr1.js
Resource
win10v2004-20220414-en
Behavioral task
behavioral31
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/virus-images1.png
Resource
win7-20220414-en
Behavioral task
behavioral32
Sample
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0pIED0Er0/virus-images1.png
Resource
win10v2004-20220414-en
General
-
Target
erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc/h0el0p0MA0Er0/virus-images.jpg
-
Size
12KB
-
MD5
55a64d2328a349b1b007efba8a64442f
-
SHA1
835e55b5eb07658127881ee474721636112189b8
-
SHA256
6f361b173bf133ce313e973bde33a5a28e2b2390aace1bd89214153778ce8c5d
-
SHA512
52bdd15d46fc95bfac5c00beea9d255818a5ff38800e68f7df1914b69363d29f2babfa3857fb37b34a7eb204038be35b79d2ad63d8dcf1b6b59b27eeab007d39
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 960 rundll32.exe
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\erxczzxEr0rgdxvngEr0hjhvhhxEr0cbchkj8282infoyxZdzc\h0el0p0MA0Er0\virus-images.jpg1⤵
- Suspicious use of FindShellTrayWindow
PID:960