Resubmissions
03/11/2022, 17:35
221103-v5z5eadac9 303/11/2022, 17:34
221103-v5j37adac6 403/11/2022, 17:33
221103-v4xb5adac3 3Analysis
-
max time kernel
107s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2022, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
IMG_5801.heic
Resource
win10v2004-20220812-en
8 signatures
300 seconds
General
-
Target
IMG_5801.heic
-
Size
2.0MB
-
MD5
3d885ba243f96dd9df04d9ba9b9d8c76
-
SHA1
713c5922c77517e0de93d0c3541a4ead8c51d8bd
-
SHA256
4d01470eed1ad4a96f4bf89f76f6d575f463caae341c2e75cdafe918b55b9892
-
SHA512
f1f256138bfb71d983117c8a74a1ca536eb7121823aff82f03a514b0593dc4f089f0e2d0d1e072c988ead16363302e18bab8da2571581bbbb2f113359607de64
-
SSDEEP
49152:71g4fqyZ5PfSTLSLPgBnM5gLNUTU0Nfxno/KJvB4QA:FyyZ5PaLKoVv6tN8KPY
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{B60D6820-51C8-433D-8ED4-414C3AED5AD7} OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{38DE2154-7D1E-4AE8-800A-15C97435EAD2} cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3664 Winword.exe 3664 Winword.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4880 OpenWith.exe -
Suspicious use of SetWindowsHookEx 48 IoCs
pid Process 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 4880 OpenWith.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe 3664 Winword.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4880 wrote to memory of 3664 4880 OpenWith.exe 84 PID 4880 wrote to memory of 3664 4880 OpenWith.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\IMG_5801.heic1⤵
- Modifies registry class
PID:2280
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\IMG_5801.heic"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3664
-