Overview
overview
10Static
static
invoice#488394.iso
windows7-x64
3invoice#488394.iso
windows10-2004-x64
3invoice.lnk
windows7-x64
3invoice.lnk
windows10-2004-x64
3just/manyGet.js
windows7-x64
3just/manyGet.js
windows10-2004-x64
1just/not.txt
windows7-x64
1just/not.txt
windows10-2004-x64
1just/themBecause.bat
windows7-x64
1just/themBecause.bat
windows10-2004-x64
1just/thingLook.dll
windows7-x64
10just/thingLook.dll
windows10-2004-x64
10just/well.txt
windows7-x64
1just/well.txt
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2022 17:05
Static task
static1
Behavioral task
behavioral1
Sample
invoice#488394.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
invoice#488394.iso
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
invoice.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
invoice.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
just/manyGet.js
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
just/manyGet.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
just/not.txt
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
just/not.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
just/themBecause.bat
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
just/themBecause.bat
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
just/thingLook.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
just/thingLook.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
just/well.txt
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
just/well.txt
Resource
win10v2004-20220901-en
General
-
Target
invoice#488394.iso
-
Size
1.3MB
-
MD5
849846adc858b2dca012a11089329baa
-
SHA1
65d5ef6dec450a14bd24a5f6ee6d0d739d2f82a2
-
SHA256
aa03c1ee92830ad562bbb2c0c3d840367e19a1a4f3a7bc03c7e3cfa8a6951606
-
SHA512
eb6259369740c802f83fc00353914da3942c71d121a09ad1443679760f531011e49eeb30860a8521b145e7cc8b4808ed819691edf2db219ae3fd783d02e5e8c7
-
SSDEEP
12288:GP0hJ5HRw7GwUwjw1wJgHwYwfw69GwHwMwMcwp8wDftkAqfw45EZUw3xCwlNwcwr:GP0hJ5Hzdx7zs7oj7xH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 384 cmd.exe Token: SeManageVolumePrivilege 384 cmd.exe