Resubmissions

22-11-2022 18:16

221122-wwfvvace62 10

09-01-2020 09:55

200109-9cw38n1aex 10

Analysis

  • max time kernel
    108s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2022 18:16

General

  • Target

    0d19f60423cb2128555e831dc340152f9588c99f3e47d64f0bb4206a6213d579.exe

  • Size

    248KB

  • MD5

    738314aa6e07f9a625e4774ac1243a79

  • SHA1

    0a7ab8cc60b04e66be11eb41672991482b9c0656

  • SHA256

    0d19f60423cb2128555e831dc340152f9588c99f3e47d64f0bb4206a6213d579

  • SHA512

    18ea6d2398ea5b858a24f51221009622dad2770177ddbeb9ec3e3736b544e1b854f35baa19d741f76f9eb181dd426df11cc64e8f0c465cd3cf8b8d381211a581

  • SSDEEP

    6144:1d4JCWlqIEWqfHNtqIl6lX5YlSMoNq9GnN5tyflgAB4:YdQHf6lelSMGq4NHyfeAB4

Score
10/10

Malware Config

Signatures

  • Clop

    Ransomware discovered in early 2019 which has been actively developed since release.

  • Detects Clop payload 1 IoCs
  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d19f60423cb2128555e831dc340152f9588c99f3e47d64f0bb4206a6213d579.exe
    "C:\Users\Admin\AppData\Local\Temp\0d19f60423cb2128555e831dc340152f9588c99f3e47d64f0bb4206a6213d579.exe"
    1⤵
      PID:664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 440
        2⤵
        • Program crash
        PID:1332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 448
        2⤵
        • Program crash
        PID:1164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 664 -ip 664
      1⤵
        PID:204
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 664 -ip 664
        1⤵
          PID:5040
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 560 -p 4224 -ip 4224
          1⤵
            PID:3380
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 4224 -s 2408
            1⤵
            • Program crash
            PID:2152
          • C:\Windows\system32\taskmgr.exe
            "C:\Windows\system32\taskmgr.exe" /4
            1⤵
            • Checks SCSI registry key(s)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:2528

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/664-132-0x0000000000400000-0x000000000043E000-memory.dmp

            Filesize

            248KB