Overview
overview
7Static
static
7a/A.class
windows7-x64
3a/A.class
windows10-2004-x64
3a/B.class
windows7-x64
3a/B.class
windows10-2004-x64
1a/C.class
windows7-x64
3a/C.class
windows10-2004-x64
1a/D.class
windows7-x64
3a/D.class
windows10-2004-x64
1a/E.class
windows7-x64
3a/E.class
windows10-2004-x64
3a/F.class
windows7-x64
3a/F.class
windows10-2004-x64
3a/G.class
windows7-x64
3a/G.class
windows10-2004-x64
1a/H.class
windows7-x64
3a/H.class
windows10-2004-x64
1a/I.class
windows7-x64
3a/I.class
windows10-2004-x64
3a/J.class
windows7-x64
3a/J.class
windows10-2004-x64
1a/K.class
windows7-x64
3a/K.class
windows10-2004-x64
1a/L.class
windows7-x64
3a/L.class
windows10-2004-x64
1a/M.class
windows7-x64
3a/M.class
windows10-2004-x64
1a/N.class
windows7-x64
3a/N.class
windows10-2004-x64
3a/O.class
windows7-x64
3a/O.class
windows10-2004-x64
3a/P.class
windows7-x64
3a/P.class
windows10-2004-x64
1Analysis
-
max time kernel
42s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 00:38
Behavioral task
behavioral1
Sample
a/A.class
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a/A.class
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
a/B.class
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
a/B.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
a/C.class
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
a/C.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
a/D.class
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
a/D.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
a/E.class
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
a/E.class
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
a/F.class
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
a/F.class
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
a/G.class
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
a/G.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
a/H.class
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
a/H.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
a/I.class
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
a/I.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
a/J.class
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
a/J.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
a/K.class
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
a/K.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
a/L.class
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
a/L.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
a/M.class
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
a/M.class
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
a/N.class
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
a/N.class
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
a/O.class
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
a/O.class
Resource
win10v2004-20220901-en
Behavioral task
behavioral31
Sample
a/P.class
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
a/P.class
Resource
win10v2004-20220812-en
General
-
Target
a/H.class
-
Size
401B
-
MD5
8b32607921d33725facfb12c68aa7691
-
SHA1
05527d92fd44ae4b4ec683a416560cb8bf959593
-
SHA256
a686598429c3a28f8dd028fc17bc4be3d5834ba5125694957e24855ae46a8f5f
-
SHA512
c9e2ff4e4654b04f063543f06def1ad43cdd10f741c5a4e43e3ee391a92fe5e6d7e49d507ea2db8ed2a57d83015d92b78c607c6ed4075906c1d8e866af2577ce
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1708 wrote to memory of 612 1708 cmd.exe 29 PID 1708 wrote to memory of 612 1708 cmd.exe 29 PID 1708 wrote to memory of 612 1708 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a\H.class1⤵
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\a\H.class2⤵PID:612
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\a\H.class"3⤵PID:432
-
-