Analysis
-
max time kernel
63s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:46
Static task
static1
Behavioral task
behavioral1
Sample
bbc1e019335b4260db85249d6d537bbecd4e3053fca3c4a8a9daf69a86c31633.rar
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bbc1e019335b4260db85249d6d537bbecd4e3053fca3c4a8a9daf69a86c31633.rar
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
朝圣社区补点竣工资料/朝圣社区补点分光器信息表.xls
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
朝圣社区补点竣工资料/朝圣社区补点分光器信息表.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
朝圣社区补点竣工资料/朝圣社区补点分光器端口信息表.xls
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
朝圣社区补点竣工资料/朝圣社区补点分光器端口信息表.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
朝圣社区补点竣工资料/朝圣社区补点标准地址采集.xls
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
朝圣社区补点竣工资料/朝圣社区补点标准地址采集.xls
Resource
win10v2004-20220812-en
General
-
Target
bbc1e019335b4260db85249d6d537bbecd4e3053fca3c4a8a9daf69a86c31633.rar
-
Size
278KB
-
MD5
3508b1e88a97f68a7d019e2d65ed5f9d
-
SHA1
248f12031f59462baac1632596d0e1fece16e577
-
SHA256
bbc1e019335b4260db85249d6d537bbecd4e3053fca3c4a8a9daf69a86c31633
-
SHA512
0fa37d24b2244a604b2e416750abd8c1071d7e663fc48b3fccd97dea575ec8993edc6f48357664e131ce046b2c974337e4a15241aa0563a401560bea7c0ac47d
-
SSDEEP
6144:ati5NzJU2JZlZDyfXrCbrZMPM+N3VnM9PgN6NlE/qO:CKNz3b1YrCPZMPM+Je9YK+/qO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 784 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 784 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
vlc.exepid process 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
vlc.exepid process 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe 784 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 784 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 968 wrote to memory of 892 968 cmd.exe rundll32.exe PID 968 wrote to memory of 892 968 cmd.exe rundll32.exe PID 968 wrote to memory of 892 968 cmd.exe rundll32.exe PID 892 wrote to memory of 784 892 rundll32.exe vlc.exe PID 892 wrote to memory of 784 892 rundll32.exe vlc.exe PID 892 wrote to memory of 784 892 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bbc1e019335b4260db85249d6d537bbecd4e3053fca3c4a8a9daf69a86c31633.rar1⤵
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\bbc1e019335b4260db85249d6d537bbecd4e3053fca3c4a8a9daf69a86c31633.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\bbc1e019335b4260db85249d6d537bbecd4e3053fca3c4a8a9daf69a86c31633.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:784
-
-