Resubmissions

29-11-2022 14:17

221129-rlwq4aga85 10

29-11-2022 12:11

221129-pcwcvsge48 10

29-11-2022 11:21

221129-ngaraadf99 10

Analysis

  • max time kernel
    601s
  • max time network
    429s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-11-2022 14:17

General

  • Target

    SD.exe

  • Size

    501KB

  • MD5

    6ea4b9b0ad0692892f6e4f1b4f05aa72

  • SHA1

    3bb50ceeaa8a698687863dd44e149214d4372601

  • SHA256

    757524b09e5d4f2399172c4ac0f6996ec34dec90110542973d438d5370aff280

  • SHA512

    f5d603cabcf98193eb569d012a1434963a995d508f0580008b6463454bdd1fe02610e3797d2b28ef5f551d6d281a9d5b12efdad9bd6cdb51a796e4c077821e48

  • SSDEEP

    6144:bouXuOPQveEDZSBdapQD0QYa5N2eAAHIbzAW1+SM/VyojODUSN:UiAmEQuQp7wbzd9JojMUSN

Malware Config

Signatures

  • PLAY Ransomware, PlayCrypt

    Ransomware family first seen in mid 2022.

  • Modifies extensions of user files 24 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 39 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SD.exe
    "C:\Users\Admin\AppData\Local\Temp\SD.exe"
    1⤵
    • Modifies extensions of user files
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in Program Files directory
    PID:364
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:26012
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x470
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:29480
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\ReadMe.txt
      1⤵
      • Opens file in notepad (likely ransom note)
      PID:30116

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-999675638-2867687379-27515722-1000\desktop.ini
      Filesize

      1KB

      MD5

      9df2ccae3593a0be06dcba23b0b4162a

      SHA1

      095f489c9668ddcde52afe70810305e9544485f1

      SHA256

      d1fc8b505e987a0bf5f77b3491a11407d74f7b41dd52bcf0c7d0bc55ee9c720f

      SHA512

      4f693c0698581ae1763b30666bb686a115cf543889033c85d78efdbb62819ca73ee230e10305831ed7367b89bd618f9d8a8fc5b825433f23ec7e465f720872c6

    • C:\ReadMe.txt
      Filesize

      189B

      MD5

      5c6d1613b1284e259f9306368916f86e

      SHA1

      c166667e416550eeedb5c9fcbd93fa2eb9bd22a4

      SHA256

      9212f61ce437e9c02848047951bd52f726c725bfcd8f77da26b02ba681781c89

      SHA512

      a30776f862eada5eb04c1b6d52009479f43b26d7575761307760ed251e3b126e5e9d3022bd4c4d5afe175d705d3be0a237918144265f980dcbd5962ceb6f2477

    • memory/364-54-0x0000000076681000-0x0000000076683000-memory.dmp
      Filesize

      8KB

    • memory/364-55-0x0000000000260000-0x000000000028C000-memory.dmp
      Filesize

      176KB

    • memory/26012-57-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp
      Filesize

      8KB