Overview
overview
10Static
static
ContractCopy_RL43.iso
windows7-x64
3ContractCopy_RL43.iso
windows10-2004-x64
3ContractCopy.js
windows7-x64
10ContractCopy.js
windows10-2004-x64
10addled/desertions.dll
windows7-x64
10addled/desertions.dll
windows10-2004-x64
10addled/petrifies.png
windows7-x64
3addled/petrifies.png
windows10-2004-x64
3addled/squawked.png
windows7-x64
3addled/squawked.png
windows10-2004-x64
3addled/volcanic.txt
windows7-x64
1addled/volcanic.txt
windows10-2004-x64
1data.txt
windows7-x64
1data.txt
windows10-2004-x64
1Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
17-11-2022 18:07
Static task
static1
Behavioral task
behavioral1
Sample
ContractCopy_RL43.iso
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ContractCopy_RL43.iso
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
ContractCopy.js
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ContractCopy.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
addled/desertions.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
addled/desertions.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
addled/petrifies.png
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
addled/petrifies.png
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
addled/squawked.png
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
addled/squawked.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
addled/volcanic.txt
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
addled/volcanic.txt
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
data.txt
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
data.txt
Resource
win10v2004-20221111-en
General
-
Target
addled/petrifies.png
-
Size
42KB
-
MD5
015aed9a464086abd5969db036f21396
-
SHA1
90ee55fcd9567a9f70c7a1dcdc8cdd89b1c29152
-
SHA256
bd8b8773f35a4fafd0a228312c65e01cd69ccc2347bdd52eef8df33c9aabfcd3
-
SHA512
227e1a55da9bbc363466f340ca295a086db38e9c891a4979fd8c2f107f8c4328f5cdb5ad73f897ecf0145968e280ea30d88cd15a21a8687f68ff6d0693e5b315
-
SSDEEP
768:z/2/9lPo0u692TSGVhQAtE8uN/PWom2cj2Ve26KP5cEatQSB6BJTGVPnSzIniew:D2ro+hGVbpuN/uzkTSEzBcVPDniew
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 988 rundll32.exe