Resubmissions
13-09-2022 06:25
220913-g6tr5aafem 1013-09-2022 06:22
220913-g48s9seha8 512-09-2022 18:09
220912-wrkcgahefn 3Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2022 06:22
Static task
static1
Behavioral task
behavioral1
Sample
sample/Document.lnk
Resource
win10-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
sample/Document.lnk
Resource
win10v2004-20220901-en
7 signatures
150 seconds
General
-
Target
sample/Document.lnk
-
Size
1KB
-
MD5
c6604e76ee959ef592e0c08bc556f3ab
-
SHA1
a68c9ce3ee38d020d165dd253105c542eccb2f9c
-
SHA256
b7c88bbf7004fe5e570c6db2730d773d0e782bebb8ab21a00309b663a95f52fb
-
SHA512
f428eeab9fe8dffa455de4fc45a1d1b48ec4bf7fffdfb2a8f1366cbeed821f0b47e8754ec5c03f9939ebab7b07ff7ff872042b3a77db0273567c7830ba652f82
Score
5/10
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk PowerShell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 4496 NOTEPAD.EXE 720 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2348 PowerShell.exe 2348 PowerShell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2348 PowerShell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 720 NOTEPAD.EXE 720 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2836 2664 cmd.exe 111 PID 2664 wrote to memory of 2836 2664 cmd.exe 111 PID 2348 wrote to memory of 3280 2348 PowerShell.exe 114 PID 2348 wrote to memory of 3280 2348 PowerShell.exe 114 PID 3280 wrote to memory of 1116 3280 cmd.exe 115 PID 3280 wrote to memory of 1116 3280 cmd.exe 115
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sample\Document.lnk1⤵PID:1724
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2152
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\sample\son\soaring.bat1⤵
- Opens file in notepad (likely ransom note)
PID:4496
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sample\son\soaring.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h son\enchanting.dat C:\Users\Admin\AppData\Local\Temp\*2⤵PID:2836
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -noexit -command Set-Location -literalPath 'C:\Users\Admin\AppData\Local\Temp\sample\son'1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sample\son\soaring.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\system32\xcopy.exexcopy /s /i /e /h son\enchanting.dat C:\Users\Admin\AppData\Local\Temp\*3⤵PID:1116
-
-
-
C:\Windows\System32\NOTEPAD.EXE"C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\sample\son\soaring.bat1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:720