Overview
overview
10Static
static
Invoice_51...DF.iso
windows7-x64
10Invoice_51...DF.iso
windows10-2004-x64
3documents.lnk
windows7-x64
3documents.lnk
windows10-2004-x64
3refreshene...al.dll
windows7-x64
1refreshene...al.dll
windows10-2004-x64
3refreshene...le.vbs
windows7-x64
3refreshene...le.vbs
windows10-2004-x64
1refreshene...us.cmd
windows7-x64
1refreshene...us.cmd
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 07:33
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_5192_october_PDF.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Invoice_5192_october_PDF.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
documents.lnk
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
documents.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
refresheners/autobiographical.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
refresheners/autobiographical.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
refresheners/dispiritedlyComprehensible.vbs
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
refresheners/dispiritedlyComprehensible.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
refresheners/unthinkableIsthmus.cmd
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
refresheners/unthinkableIsthmus.cmd
Resource
win10v2004-20220812-en
General
-
Target
Invoice_5192_october_PDF.iso
-
Size
3.1MB
-
MD5
be78cdcec94c8840177f6ff4aee34308
-
SHA1
affe6055e02f6810b5824f1f310a2a4eb19db1e4
-
SHA256
17da2f6eafb65540a89058b0b285a34c9dad8772eeecca92dde03f9560b3e76d
-
SHA512
71170b9638d4ef1a9294b071696c241691938e9e9b8c8be682eeb386cbbf96bcc91e910468e2c6a834e74a09c7f6eb20f15a0f3e1b7b5938ae3fd27c45ff7fdf
-
SSDEEP
49152:mHUV3vWVjM+Ajfsa7w7O66nh3+fKsWxN5lqyMR3yxyMy96Tc7TB1wcSIllyFzxk1:UVIcdi33LV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeManageVolumePrivilege 728 cmd.exe Token: SeManageVolumePrivilege 728 cmd.exe