Analysis
-
max time kernel
119s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 06:51
Static task
static1
Behavioral task
behavioral1
Sample
LMtest.php
Resource
win7-20220901-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
LMtest.php
Resource
win10v2004-20220812-en
3 signatures
150 seconds
General
-
Target
LMtest.php
-
Size
4B
-
MD5
098f6bcd4621d373cade4e832627b4f6
-
SHA1
a94a8fe5ccb19ba61c4c0873d391e987982fbbd3
-
SHA256
9f86d081884c7d659a2feaa0c55ad015a3bf4f1b2b0b822cd15d6c15b0f00a08
-
SHA512
ee26b0dd4af7e749aa1a8ee3c10ae9923f618980772e473f8819a5d4940e0db27ac185f8a0e1d5f84f88bc887fd67b143732c304cc5fa9ad8e6f57f50028a8ff
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 684 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1416 wrote to memory of 684 1416 cmd.exe 28 PID 1416 wrote to memory of 684 1416 cmd.exe 28 PID 1416 wrote to memory of 684 1416 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\LMtest.php1⤵
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\LMtest.php2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:684
-