Resubmissions
05/03/2025, 21:07
250305-zydp2sywbw 716/11/2022, 10:41
221116-mq9fjaeb31 807/09/2020, 18:51
200907-pl7ygfpqxs 7Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2022, 10:41
Static task
static1
Behavioral task
behavioral1
Sample
d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe
Resource
win10v2004-20220812-en
General
-
Target
d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe
-
Size
76KB
-
MD5
a4782bbfe7300e51e2e3f962fe9ea33f
-
SHA1
9b5facdba4a5dc8395874e3fd91b983048157f28
-
SHA256
d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35
-
SHA512
544a15f6039d1cac735f15d9c1a6504e8ac9836b2c5fa02f2620ed570bbe98c87950d389928927c0fa42b6c3223709db52af869ba491930370cd9757538d66d9
-
SSDEEP
1536:ODuTzBQ+4UowCcI8UYJxs+j4mTRBIFe+5rttOmq:EuTzBSUgcI83dj4UIFektOm
Malware Config
Signatures
-
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\NewUndo.png.encrypted d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WinWord64 = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe\" " d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3608 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3608 taskmgr.exe Token: SeSystemProfilePrivilege 3608 taskmgr.exe Token: SeCreateGlobalPrivilege 3608 taskmgr.exe -
Suspicious use of FindShellTrayWindow 23 IoCs
pid Process 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe 3608 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe"C:\Users\Admin\AppData\Local\Temp\d62b8ff3de422cdacdc3bc804990c2c12a0b3675c9c98e38f5788b693ec5ff35.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
PID:4176
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3608