Analysis
-
max time kernel
151s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 10:38
Static task
static1
Behavioral task
behavioral1
Sample
s/go.sh
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
s/go.sh
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
s/ps
Resource
ubuntu1804-amd64-20221111-en
Behavioral task
behavioral4
Sample
s/scan
Resource
ubuntu1804-amd64-20221111-en
Behavioral task
behavioral5
Sample
s/scan
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral6
Sample
s/scan
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral7
Sample
s/scan
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral8
Sample
s/ss
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral9
Sample
s/ssh-scan
Resource
ubuntu1804-amd64-20221111-en
General
-
Target
s/go.sh
-
Size
125B
-
MD5
f8dab7c30afe989a3324752b9703449d
-
SHA1
487bc217f6f2415431a9134612aa0f4b14a8afa9
-
SHA256
be8424f3c8f6b8cdeb743d00a4891925704e9066f682efa26e22c860200cfc2b
-
SHA512
d384ac879447df1d94888c292ae670f4c03e5eb907d9c3bfa436acd7727ab625d45c506d525c57bcee73c0e7de368c70a88216406cc7e95a75d7de2ffe28d780
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\sh_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\sh_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\.sh rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 860 AcroRd32.exe 860 AcroRd32.exe 860 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2000 wrote to memory of 696 2000 cmd.exe 27 PID 2000 wrote to memory of 696 2000 cmd.exe 27 PID 2000 wrote to memory of 696 2000 cmd.exe 27 PID 696 wrote to memory of 860 696 rundll32.exe 28 PID 696 wrote to memory of 860 696 rundll32.exe 28 PID 696 wrote to memory of 860 696 rundll32.exe 28 PID 696 wrote to memory of 860 696 rundll32.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\s\go.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\s\go.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\s\go.sh"3⤵
- Suspicious use of SetWindowsHookEx
PID:860
-
-