Overview
overview
9Static
static
InstaRepor...Bot.py
ubuntu-18.04-amd64
7InstaRepor...Bot.py
debian-9-armhf
1InstaRepor...Bot.py
debian-9-mips
1InstaRepor...Bot.py
debian-9-mipsel
1InstaRepor...out.py
windows7-x64
3InstaRepor...out.py
windows10-2004-x64
3InstaRepor...elp.py
windows7-x64
3InstaRepor...elp.py
windows10-2004-x64
3InstaRepor...ion.py
windows7-x64
3InstaRepor...ion.py
windows10-2004-x64
3InstaRepor...ack.py
ubuntu-18.04-amd64
1InstaRepor...ack.py
debian-9-armhf
1InstaRepor...ack.py
debian-9-mips
1InstaRepor...ack.py
debian-9-mipsel
1InstaRepor...les.py
windows7-x64
3InstaRepor...les.py
windows10-2004-x64
3InstaRepor...ogo.py
windows7-x64
3InstaRepor...ogo.py
windows10-2004-x64
3InstaRepor...ter.py
ubuntu-18.04-amd64
9InstaRepor...ter.py
debian-9-armhf
1InstaRepor...ter.py
debian-9-mips
1InstaRepor...ter.py
debian-9-mipsel
1InstaRepor...nts.py
windows7-x64
3InstaRepor...nts.py
windows10-2004-x64
3InstaRepor...ils.py
windows7-x64
3InstaRepor...ils.py
windows10-2004-x64
5InstaRepor...tup.sh
windows7-x64
3InstaRepor...tup.sh
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 12:31
Static task
static1
Behavioral task
behavioral1
Sample
InstaReport-main/ReportBot.py
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral2
Sample
InstaReport-main/ReportBot.py
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral3
Sample
InstaReport-main/ReportBot.py
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral4
Sample
InstaReport-main/ReportBot.py
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral5
Sample
InstaReport-main/about.py
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
InstaReport-main/about.py
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
InstaReport-main/help.py
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
InstaReport-main/help.py
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
InstaReport-main/libs/animation.py
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
InstaReport-main/libs/animation.py
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
InstaReport-main/libs/attack.py
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral12
Sample
InstaReport-main/libs/attack.py
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral13
Sample
InstaReport-main/libs/attack.py
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral14
Sample
InstaReport-main/libs/attack.py
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral15
Sample
InstaReport-main/libs/check_modules.py
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
InstaReport-main/libs/check_modules.py
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
InstaReport-main/libs/logo.py
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
InstaReport-main/libs/logo.py
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
InstaReport-main/libs/proxy_harvester.py
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral20
Sample
InstaReport-main/libs/proxy_harvester.py
Resource
debian9-armhf-en-20211208
Behavioral task
behavioral21
Sample
InstaReport-main/libs/proxy_harvester.py
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral22
Sample
InstaReport-main/libs/proxy_harvester.py
Resource
debian9-mipsel-en-20211208
Behavioral task
behavioral23
Sample
InstaReport-main/libs/user_agents.py
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
InstaReport-main/libs/user_agents.py
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
InstaReport-main/libs/utils.py
Resource
win7-20221111-en
Behavioral task
behavioral26
Sample
InstaReport-main/libs/utils.py
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
InstaReport-main/setup.sh
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
InstaReport-main/setup.sh
Resource
win10v2004-20221111-en
General
-
Target
InstaReport-main/libs/utils.py
-
Size
1KB
-
MD5
4e8efd84bd5191b73e8ff875a25d5024
-
SHA1
f8c7d50ca00f069d8599ab237022e244eab043b6
-
SHA256
4150f896791853de4ce479d43e211e8c8ff6f2f3b7e4b9b129d5c9ffe3cb0667
-
SHA512
58d61606e66f1f9159b699be15e78ee0f3d0ddc137ecf42dc05324799c70283799abd231e904c7c98032d0b441700e9e55c88fbd9cb7d4ae99ae44859e6543ed
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{7EA89C0C-7AC1-4F8A-8E47-D28070460D84}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{BB9F585E-C9BF-4C4A-8446-9CB0BFD4E1FC}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies registry class 2 IoCs
Processes:
OpenWith.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 3012 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\InstaReport-main\libs\utils.py1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry