Analysis
-
max time kernel
230s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 19:10
Static task
static1
Behavioral task
behavioral1
Sample
m32/libcurl-4.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
m32/libcurl-4.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
m32/minerd.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
m32/minerd.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
m32/pthreadGC2.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
m32/pthreadGC2.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
updates.pl
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
updates.pl
Resource
win10v2004-20220812-en
General
-
Target
updates.pl
-
Size
31KB
-
MD5
8293029682e7c6521e4a449a818975cf
-
SHA1
8d9c57f91c21c23bccedc581f25e5863c445ac4d
-
SHA256
07157a15adb84c3ef39a3d25145bee7c17cf6ff620e19a31a7a2e30ca22ffeea
-
SHA512
50f5e69be67cf8574366d47f7dd463410d1a9887dae014d52b31138a253b24950c8787d2ee7bc09b3f37e06119910e2b55ecc5f48ae9eb8a17fab403fcef7cd7
-
SSDEEP
384:TVemswyLcIZfkH70M9lsSu5se4KzGJewHa/FF/lsheeRFxfINOP:TVxsbLcQwAylEme4KqI/FxShdyc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 13 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file\shell\edit\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\.pl rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\.pl\ = "pl_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\pl_auto_file\shell\open rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1472 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 560 wrote to memory of 1364 560 cmd.exe rundll32.exe PID 560 wrote to memory of 1364 560 cmd.exe rundll32.exe PID 560 wrote to memory of 1364 560 cmd.exe rundll32.exe PID 1364 wrote to memory of 1472 1364 rundll32.exe NOTEPAD.EXE PID 1364 wrote to memory of 1472 1364 rundll32.exe NOTEPAD.EXE PID 1364 wrote to memory of 1472 1364 rundll32.exe NOTEPAD.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\updates.pl1⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\updates.pl2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\updates.pl3⤵
- Opens file in notepad (likely ransom note)
PID:1472