Analysis
-
max time kernel
113s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2022 06:47
Static task
static1
Behavioral task
behavioral1
Sample
reshacker_setup.exe
Resource
win10v2004-20220812-en
General
-
Target
reshacker_setup.exe
-
Size
4.0MB
-
MD5
e846ef7353af351ad4a6e1d49638b500
-
SHA1
c08392c797fcea5147b3f0d7e07f57eedc323911
-
SHA256
080e97f7c198aeeac2a172f055c09d8da365b59b58bf6a71bde4486d9992ff66
-
SHA512
e73bd521a157af4388b7c0d3bff5b34a4a547b8083137a4b48d0c232562d5932c7bb89b6700778246b895d7b9d1ba59050f3a631dfd436f64b5ff9ecf7934ec5
-
SSDEEP
98304:HEnF3qBlk/aDK9b0SVtlOMKTNdSLUHBrICc:y3KkyDgQSVKMKTeIHA
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
reshacker_setup.tmpResourceHacker.exepid process 1256 reshacker_setup.tmp 3728 ResourceHacker.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
reshacker_setup.tmpdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation reshacker_setup.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 25 IoCs
Processes:
ResourceHacker.exereshacker_setup.tmpdescription ioc process File created C:\Program Files (x86)\Resource Hacker\ResourceHacker.ini ResourceHacker.exe File opened for modification C:\Program Files (x86)\Resource Hacker\ResourceHacker.exe reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\is-SFGVP.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\samples\is-FPOR7.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-2I2RE.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-QQDVC.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-LDVC5.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-TV6LV.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-BRUKA.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\is-QM9ML.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-JRUKL.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-2OTVM.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\samples\is-MQ7OF.tmp reshacker_setup.tmp File opened for modification C:\Program Files (x86)\Resource Hacker\ResourceHacker.ini ResourceHacker.exe File created C:\Program Files (x86)\Resource Hacker\help\is-72GK9.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\samples\is-74AK7.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\samples\is-RR9AI.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\is-CAKG9.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-H7213.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\help\is-3BT31.tmp reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\samples\is-M1VE8.tmp reshacker_setup.tmp File opened for modification C:\Program Files (x86)\Resource Hacker\unins000.dat reshacker_setup.tmp File opened for modification C:\Program Files (x86)\Resource Hacker\samples\sample2.dll reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\unins000.dat reshacker_setup.tmp File created C:\Program Files (x86)\Resource Hacker\is-GA5U2.tmp reshacker_setup.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 40 IoCs
Processes:
ResourceHacker.exereshacker_setup.tmpdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 ResourceHacker.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 98003100000000003755fa45110050524f4752417e320000800009000400efbe874fdb493755fa452e000000c3040000000001000000000000000000560000000000f7922200500072006f006700720061006d002000460069006c0065007300200028007800380036002900000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003700000018000000 ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" ResourceHacker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff ResourceHacker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings reshacker_setup.tmp Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 68003100000000003755fb4510005245534f55527e310000500009000400efbe3755fa453755fc452e000000c29d0000000006000000000000000000000000000000ed5800015200650073006f00750072006300650020004800610063006b0065007200000018000000 ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff ResourceHacker.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 ResourceHacker.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" ResourceHacker.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" ResourceHacker.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
ResourceHacker.exepid process 3728 ResourceHacker.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
reshacker_setup.tmppid process 1256 reshacker_setup.tmp 1256 reshacker_setup.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
reshacker_setup.tmppid process 1256 reshacker_setup.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
ResourceHacker.exepid process 3728 ResourceHacker.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
reshacker_setup.exereshacker_setup.tmpdescription pid process target process PID 1700 wrote to memory of 1256 1700 reshacker_setup.exe reshacker_setup.tmp PID 1700 wrote to memory of 1256 1700 reshacker_setup.exe reshacker_setup.tmp PID 1700 wrote to memory of 1256 1700 reshacker_setup.exe reshacker_setup.tmp PID 1256 wrote to memory of 240 1256 reshacker_setup.tmp NOTEPAD.EXE PID 1256 wrote to memory of 240 1256 reshacker_setup.tmp NOTEPAD.EXE PID 1256 wrote to memory of 240 1256 reshacker_setup.tmp NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\reshacker_setup.exe"C:\Users\Admin\AppData\Local\Temp\reshacker_setup.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\is-092NF.tmp\reshacker_setup.tmp"C:\Users\Admin\AppData\Local\Temp\is-092NF.tmp\reshacker_setup.tmp" /SL5="$701F2,3411549,870400,C:\Users\Admin\AppData\Local\Temp\reshacker_setup.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Program Files (x86)\Resource Hacker\ReadMe.txt3⤵
-
C:\Program Files (x86)\Resource Hacker\ResourceHacker.exe"C:\Program Files (x86)\Resource Hacker\ResourceHacker.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Resource Hacker\ReadMe.txtFilesize
1KB
MD5eee9717c2fd4f926c23b6fbbd7174be5
SHA11596921b80753e25dacff3499a8ecd3e81e6d7c9
SHA256afe15bbaef0dd02cdefdd6b366084a838ea40e29c21173d68d28cb629cf69203
SHA512778f84fb27cba9b2283b468859e740418a2ed3aef5f087a7a554b91224f88ebe244d36ead138b8c4d8ebf00f98661dd3a60fa3681f3717e84ad9f73169942e0a
-
C:\Program Files (x86)\Resource Hacker\ResourceHacker.exeFilesize
5.4MB
MD5b406ef352a5e5260f179e7abd2feb846
SHA1faabfd4a58775a9c2240bb07a48b7451506fd984
SHA2564ab1a1035588f0c99b00e39d87ef9a0d940437a05802f0e75956ab65149133be
SHA512bd10dd1d21dde7ddc77e91a5bc769797fe7388168f71225afac337b9aabb41b362cb6abcac1eac545ad2ec36686b48f6fe52c4036e27f903939e9a73fad6be1b
-
C:\Program Files (x86)\Resource Hacker\ResourceHacker.exeFilesize
5.4MB
MD5b406ef352a5e5260f179e7abd2feb846
SHA1faabfd4a58775a9c2240bb07a48b7451506fd984
SHA2564ab1a1035588f0c99b00e39d87ef9a0d940437a05802f0e75956ab65149133be
SHA512bd10dd1d21dde7ddc77e91a5bc769797fe7388168f71225afac337b9aabb41b362cb6abcac1eac545ad2ec36686b48f6fe52c4036e27f903939e9a73fad6be1b
-
C:\Program Files (x86)\Resource Hacker\unins000.exeFilesize
2.6MB
MD5aa50fbaf52e0b04527cc6361d5473d90
SHA15dcce8dd952c92f71522397bd0e0ad036b6ca436
SHA2568a66cbeed0cdf951c5c104a4692d5a2b02fcdbb530827125f4050020ac86e906
SHA5123e44b320b2bdd66b8b2bb51c599a0fb0a051917689ed90d80d69045530d6a5dbfb75657b5083e19828433aeaa0335053ea531f889c5535d19c2e63c15e75f36b
-
C:\Users\Admin\AppData\Local\Temp\is-092NF.tmp\reshacker_setup.tmpFilesize
2.5MB
MD53baaf568aa5142e9eeed4ec6cdd764b7
SHA1089ec2257a57c0f2ee913a94e61c1c8272de6290
SHA256153efbe85cecec3149664254a856440fbb6a3c8f3f287a97f373b3353e816268
SHA5124a30732ea3c5a2e8529eab69761a25862c87935fc3842b48d515901669725ff070527ccd61dd602dfced94cd504b7ff2861f43ffba1ead6569b8b26544845287
-
C:\Users\Admin\AppData\Local\Temp\is-092NF.tmp\reshacker_setup.tmpFilesize
2.5MB
MD53baaf568aa5142e9eeed4ec6cdd764b7
SHA1089ec2257a57c0f2ee913a94e61c1c8272de6290
SHA256153efbe85cecec3149664254a856440fbb6a3c8f3f287a97f373b3353e816268
SHA5124a30732ea3c5a2e8529eab69761a25862c87935fc3842b48d515901669725ff070527ccd61dd602dfced94cd504b7ff2861f43ffba1ead6569b8b26544845287
-
memory/240-141-0x0000000000000000-mapping.dmp
-
memory/1256-137-0x0000000000000000-mapping.dmp
-
memory/1700-135-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/1700-139-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB
-
memory/1700-143-0x0000000000400000-0x00000000004E2000-memory.dmpFilesize
904KB