Overview
overview
8Static
static
83C518.xz
windows7-x64
33C518.xz
windows10-1703-x64
33C518.xz
windows10-2004-x64
33C518.xz
android-10-x64
3C518.xz
android-11-x64
3C518.xz
android-9-x86
3C518.xz
macos-10.15-amd64
13C518.xz
debian-9-armhf
3C518.xz
debian-9-mips
3C518.xz
debian-9-mipsel
3C518.xz
ubuntu-18.04-amd64
Analysis
-
max time kernel
1200s -
max time network
915s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/09/2022, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
3C518.xz
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3C518.xz
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
3C518.xz
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
3C518.xz
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
3C518.xz
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
3C518.xz
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral7
Sample
3C518.xz
Resource
macos-20220504-en
Behavioral task
behavioral8
Sample
3C518.xz
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral9
Sample
3C518.xz
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral10
Sample
3C518.xz
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral11
Sample
3C518.xz
Resource
ubuntu1804-amd64-en-20211208
General
-
Target
3C518.xz
-
Size
6.1MB
-
MD5
0088c40eeb9e821c7069169f3bd512b1
-
SHA1
a25e57c424743351a4727f2bf91998bd1997b8d2
-
SHA256
6e7456575c919db5233aba5bf973bd6509a40c1280063b38db75b7061adf00b5
-
SHA512
b7b3b3ffb6360f65fe61ab99b51c05ae945cdd34aa1063a1fdacda8f08968733682ad51ed5268d748933234d5c237596084ff79b6f4ab35b6e7f7dc9504dd9cb
-
SSDEEP
24576:66KDvVnj5Z9qj3XvrRkK8+cMaWKO+TWthXu6tqasKvdwkDI7tZzScnw+6/d0uT:6Ud
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\xz_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\xz_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\xz_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\xz_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\xz_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.xz rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.xz\ = "xz_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\xz_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1276 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1276 AcroRd32.exe 1276 AcroRd32.exe 1276 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1720 1660 cmd.exe 29 PID 1660 wrote to memory of 1720 1660 cmd.exe 29 PID 1660 wrote to memory of 1720 1660 cmd.exe 29 PID 1720 wrote to memory of 1276 1720 rundll32.exe 30 PID 1720 wrote to memory of 1276 1720 rundll32.exe 30 PID 1720 wrote to memory of 1276 1720 rundll32.exe 30 PID 1720 wrote to memory of 1276 1720 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\3C518.xz1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\3C518.xz2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\3C518.xz"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1276
-
-