Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
09-08-2022 17:40
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://109.206.241.211/wget.sh
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
http://109.206.241.211/wget.sh
Resource
win10v2004-20220721-en
General
-
Target
http://109.206.241.211/wget.sh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 12 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file\shell\open rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file\shell\edit\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000_CLASSES\sh_auto_file\shell\open\command rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1596 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exepid process 916 chrome.exe 2040 chrome.exe 2040 chrome.exe 1508 chrome.exe 700 chrome.exe 1304 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
Processes:
chrome.exepid process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe 2040 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2040 wrote to memory of 1008 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 1008 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 1008 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 576 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 916 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 916 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 916 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe PID 2040 wrote to memory of 800 2040 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://109.206.241.211/wget.sh1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb614f50,0x7fefb614f60,0x7fefb614f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1120 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3028 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3684 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1464 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3600 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3552 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3620 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3480 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3468 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1112,5780387708540929416,17392872575767882022,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Downloads\wget.sh1⤵
- Modifies registry class
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\wget.sh2⤵
- Opens file in notepad (likely ransom note)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Downloads\wget.shFilesize
2KB
MD56ea4bb1f0d2533ca1c9d5eed783e6b3f
SHA161ee8abeb0fad89df902b33303126faa90b23429
SHA256ee8bbe66e0e198c862b2886a88c3798e78d9b763e5c844fb01ed3d220e4de0fc
SHA51267e98744f174715a4db36e9e8694b297f11b4bcc06879390f014b8a5bd670b176321f05de579b36adb4705018bf8bc709c803bb086dde450a6d7b277754946b7
-
\??\pipe\crashpad_2040_DPVBYFVZYWTRRRQGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1596-56-0x0000000000000000-mapping.dmp
-
memory/1604-55-0x000007FEFC211000-0x000007FEFC213000-memory.dmpFilesize
8KB