Overview
overview
8Static
static
AutoUpdate...ts.zip
windows7-x64
1AutoUpdate...ts.zip
windows10-2004-x64
1AutoUpdate...c27.js
windows7-x64
8AutoUpdate...c27.js
windows10-2004-x64
8AutoUpdate...C.json
windows7-x64
3AutoUpdate...C.json
windows10-2004-x64
3AutoUpdate...is.log
windows7-x64
1AutoUpdate...is.log
windows10-2004-x64
1AutoUpdate...s.json
windows7-x64
3AutoUpdate...s.json
windows10-2004-x64
3AutoUpdate...s.json
windows7-x64
3AutoUpdate...s.json
windows10-2004-x64
3Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22-09-2022 21:54
Static task
static1
Behavioral task
behavioral1
Sample
AutoUpdater2.js.results.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AutoUpdater2.js.results.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
AutoUpdater2.js.results/5ea8f1a8-8b7b-4caf-9132-6b066d0b3c27.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
AutoUpdater2.js.results/5ea8f1a8-8b7b-4caf-9132-6b066d0b3c27.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
AutoUpdater2.js.results/IOC.json
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
AutoUpdater2.js.results/IOC.json
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
AutoUpdater2.js.results/analysis.log
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
AutoUpdater2.js.results/analysis.log
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
AutoUpdater2.js.results/snippets.json
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
AutoUpdater2.js.results/snippets.json
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
AutoUpdater2.js.results/urls.json
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
AutoUpdater2.js.results/urls.json
Resource
win10v2004-20220812-en
General
-
Target
AutoUpdater2.js.results/snippets.json
-
Size
72B
-
MD5
03ea22027d396683b9493cfa14bca111
-
SHA1
0fbfba71e389702f1a991740b9453ced80665fb8
-
SHA256
2ce7e74ee0c33343de0114c30fdad6d351b62c9aed27a619a5b9419d37c3ac09
-
SHA512
d5eeaf372b460fe2b0b1798bd532819fc3d6f768c9c98098d13d01f63334394a07f293e2d366cd863cf2317c1ff8a2a8ea1bb83f8aba5d90f9b387f7b26d911e
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\json_auto_file\shell rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1804 AcroRd32.exe 1804 AcroRd32.exe 1804 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2020 1836 cmd.exe 28 PID 1836 wrote to memory of 2020 1836 cmd.exe 28 PID 1836 wrote to memory of 2020 1836 cmd.exe 28 PID 2020 wrote to memory of 1804 2020 rundll32.exe 29 PID 2020 wrote to memory of 1804 2020 rundll32.exe 29 PID 2020 wrote to memory of 1804 2020 rundll32.exe 29 PID 2020 wrote to memory of 1804 2020 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\AutoUpdater2.js.results\snippets.json1⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\AutoUpdater2.js.results\snippets.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\AutoUpdater2.js.results\snippets.json"3⤵
- Suspicious use of SetWindowsHookEx
PID:1804
-
-