Overview
overview
8Static
static
douzhanshe...00.dll
windows7-x64
3douzhanshe...00.dll
windows10-2004-x64
3douzhanshe...00.dll
windows7-x64
3douzhanshe...00.dll
windows10-2004-x64
3douzhanshe...��.exe
windows7-x64
8douzhanshe...��.exe
windows10-2004-x64
8douzhanshe....url
windows7-x64
1douzhanshe....url
windows10-2004-x64
1Analysis
-
max time kernel
97s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
douzhanshenxiaoliang/msvcp100.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
douzhanshenxiaoliang/msvcp100.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
douzhanshenxiaoliang/msvcr100.dll
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
douzhanshenxiaoliang/msvcr100.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
douzhanshenxiaoliang/սС.exe
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
douzhanshenxiaoliang/սС.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
douzhanshenxiaoliang/.url
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
douzhanshenxiaoliang/.url
Resource
win10v2004-20220812-en
General
-
Target
douzhanshenxiaoliang/սС.exe
-
Size
852KB
-
MD5
f1ee198197adbf6fddbe29f522f58c8c
-
SHA1
4bec5815b55690a5c69f5af5894566c36cfed581
-
SHA256
03bf584dca3d676a2044a3f7062e2a69b6233c2368ac8de7c806c7d70d6e5876
-
SHA512
2a0a19efedc9186c2be1932889622871d3f218e56fcdce3b9252e66941078470337b73e268fcb46a6a6937aa536c1295069f23173fba25695c3050321b9af2b9
-
SSDEEP
12288:3aniS1QChHr051P3Demxv1A8+wizXa/JX20SdfaP5E1/SMZoSrF5KG9i:ZDvxNAJwizX1dfamQM/T4
Malware Config
Signatures
-
resource yara_rule behavioral5/memory/1592-55-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-57-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-59-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-56-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-63-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-61-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-67-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-65-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-69-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-73-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-71-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-75-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-79-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-77-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-81-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-85-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-83-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-89-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-87-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-91-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-95-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-93-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-97-0x0000000010000000-0x000000001003D000-memory.dmp upx behavioral5/memory/1592-98-0x0000000010000000-0x000000001003D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main սС.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch սС.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" սС.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1592 սС.exe 1592 սС.exe 1592 սС.exe 1592 սС.exe 1592 սС.exe