Analysis

  • max time kernel
    113s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-09-2022 06:47

General

  • Target

    reshacker_setup.exe

  • Size

    4.0MB

  • MD5

    e846ef7353af351ad4a6e1d49638b500

  • SHA1

    c08392c797fcea5147b3f0d7e07f57eedc323911

  • SHA256

    080e97f7c198aeeac2a172f055c09d8da365b59b58bf6a71bde4486d9992ff66

  • SHA512

    e73bd521a157af4388b7c0d3bff5b34a4a547b8083137a4b48d0c232562d5932c7bb89b6700778246b895d7b9d1ba59050f3a631dfd436f64b5ff9ecf7934ec5

  • SSDEEP

    98304:HEnF3qBlk/aDK9b0SVtlOMKTNdSLUHBrICc:y3KkyDgQSVKMKTeIHA

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 25 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 40 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\reshacker_setup.exe
    "C:\Users\Admin\AppData\Local\Temp\reshacker_setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Users\Admin\AppData\Local\Temp\is-092NF.tmp\reshacker_setup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-092NF.tmp\reshacker_setup.tmp" /SL5="$701F2,3411549,870400,C:\Users\Admin\AppData\Local\Temp\reshacker_setup.exe"
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Windows\SysWOW64\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Program Files (x86)\Resource Hacker\ReadMe.txt
        3⤵
          PID:240
    • C:\Program Files (x86)\Resource Hacker\ResourceHacker.exe
      "C:\Program Files (x86)\Resource Hacker\ResourceHacker.exe"
      1⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:3728

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Resource Hacker\ReadMe.txt
      Filesize

      1KB

      MD5

      eee9717c2fd4f926c23b6fbbd7174be5

      SHA1

      1596921b80753e25dacff3499a8ecd3e81e6d7c9

      SHA256

      afe15bbaef0dd02cdefdd6b366084a838ea40e29c21173d68d28cb629cf69203

      SHA512

      778f84fb27cba9b2283b468859e740418a2ed3aef5f087a7a554b91224f88ebe244d36ead138b8c4d8ebf00f98661dd3a60fa3681f3717e84ad9f73169942e0a

    • C:\Program Files (x86)\Resource Hacker\ResourceHacker.exe
      Filesize

      5.4MB

      MD5

      b406ef352a5e5260f179e7abd2feb846

      SHA1

      faabfd4a58775a9c2240bb07a48b7451506fd984

      SHA256

      4ab1a1035588f0c99b00e39d87ef9a0d940437a05802f0e75956ab65149133be

      SHA512

      bd10dd1d21dde7ddc77e91a5bc769797fe7388168f71225afac337b9aabb41b362cb6abcac1eac545ad2ec36686b48f6fe52c4036e27f903939e9a73fad6be1b

    • C:\Program Files (x86)\Resource Hacker\ResourceHacker.exe
      Filesize

      5.4MB

      MD5

      b406ef352a5e5260f179e7abd2feb846

      SHA1

      faabfd4a58775a9c2240bb07a48b7451506fd984

      SHA256

      4ab1a1035588f0c99b00e39d87ef9a0d940437a05802f0e75956ab65149133be

      SHA512

      bd10dd1d21dde7ddc77e91a5bc769797fe7388168f71225afac337b9aabb41b362cb6abcac1eac545ad2ec36686b48f6fe52c4036e27f903939e9a73fad6be1b

    • C:\Program Files (x86)\Resource Hacker\unins000.exe
      Filesize

      2.6MB

      MD5

      aa50fbaf52e0b04527cc6361d5473d90

      SHA1

      5dcce8dd952c92f71522397bd0e0ad036b6ca436

      SHA256

      8a66cbeed0cdf951c5c104a4692d5a2b02fcdbb530827125f4050020ac86e906

      SHA512

      3e44b320b2bdd66b8b2bb51c599a0fb0a051917689ed90d80d69045530d6a5dbfb75657b5083e19828433aeaa0335053ea531f889c5535d19c2e63c15e75f36b

    • C:\Users\Admin\AppData\Local\Temp\is-092NF.tmp\reshacker_setup.tmp
      Filesize

      2.5MB

      MD5

      3baaf568aa5142e9eeed4ec6cdd764b7

      SHA1

      089ec2257a57c0f2ee913a94e61c1c8272de6290

      SHA256

      153efbe85cecec3149664254a856440fbb6a3c8f3f287a97f373b3353e816268

      SHA512

      4a30732ea3c5a2e8529eab69761a25862c87935fc3842b48d515901669725ff070527ccd61dd602dfced94cd504b7ff2861f43ffba1ead6569b8b26544845287

    • C:\Users\Admin\AppData\Local\Temp\is-092NF.tmp\reshacker_setup.tmp
      Filesize

      2.5MB

      MD5

      3baaf568aa5142e9eeed4ec6cdd764b7

      SHA1

      089ec2257a57c0f2ee913a94e61c1c8272de6290

      SHA256

      153efbe85cecec3149664254a856440fbb6a3c8f3f287a97f373b3353e816268

      SHA512

      4a30732ea3c5a2e8529eab69761a25862c87935fc3842b48d515901669725ff070527ccd61dd602dfced94cd504b7ff2861f43ffba1ead6569b8b26544845287

    • memory/240-141-0x0000000000000000-mapping.dmp
    • memory/1256-137-0x0000000000000000-mapping.dmp
    • memory/1700-135-0x0000000000400000-0x00000000004E2000-memory.dmp
      Filesize

      904KB

    • memory/1700-139-0x0000000000400000-0x00000000004E2000-memory.dmp
      Filesize

      904KB

    • memory/1700-143-0x0000000000400000-0x00000000004E2000-memory.dmp
      Filesize

      904KB