Analysis
-
max time kernel
57s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 08:28
Behavioral task
behavioral1
Sample
2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0.rar
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0.rar
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
faturanet.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
faturanet.exe
Resource
win10v2004-20221111-en
General
-
Target
2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0.rar
-
Size
207KB
-
MD5
4a46e340e13d0cdb5a45a75a35845e34
-
SHA1
2eba7746c710ab298c4195c0e6985c0cf96c9113
-
SHA256
2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0
-
SHA512
0f4a40e21fdfa01dfeec9048885fe1a146e6c55ef404215f0d860511be13a4495e64ae3804346ab51a684db0f4ca569bcad1f3e0dcc6348e759d0ed594c6856f
-
SSDEEP
6144:YPEMEfg0R1lKQQxlf4JZr/FXhdPhm2GqNamJ7NfStV:PMeg4lPE4JlJhdpmYPJ7NfY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1356 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1356 vlc.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
Processes:
vlc.exepid process 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe -
Suspicious use of SendNotifyMessage 17 IoCs
Processes:
vlc.exepid process 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe 1356 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1356 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2024 wrote to memory of 556 2024 cmd.exe rundll32.exe PID 2024 wrote to memory of 556 2024 cmd.exe rundll32.exe PID 2024 wrote to memory of 556 2024 cmd.exe rundll32.exe PID 556 wrote to memory of 1356 556 rundll32.exe vlc.exe PID 556 wrote to memory of 1356 556 rundll32.exe vlc.exe PID 556 wrote to memory of 1356 556 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\2a3c5075363be6ad673b7c6daca4acfbf14c537e3951b784f8f24ebc39352cb0.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1356
-
-