Overview
overview
10Static
static
RRFB17.vhd
windows7-x64
3RRFB17.vhd
windows10-2004-x64
3out.vhd
windows7-x64
1out.vhd
windows10-2004-x64
1RR.lnk
windows7-x64
10RR.lnk
windows10-2004-x64
10System Vol...gs.dat
windows7-x64
3System Vol...gs.dat
windows10-2004-x64
3unmarketable/awed.gif
windows7-x64
1unmarketable/awed.gif
windows10-2004-x64
1unmarketab...ne.dll
windows7-x64
10unmarketab...ne.dll
windows10-2004-x64
10unmarketab...ng.gif
windows7-x64
1unmarketab...ng.gif
windows10-2004-x64
1unmarketab...ng.txt
windows7-x64
1unmarketab...ng.txt
windows10-2004-x64
1unmarketab...us.cmd
windows7-x64
1unmarketab...us.cmd
windows10-2004-x64
1unmarketab...le.cmd
windows7-x64
1unmarketab...le.cmd
windows10-2004-x64
1unmarketab...le.jpg
windows7-x64
3unmarketab...le.jpg
windows10-2004-x64
3unmarketab...ng.png
windows7-x64
3unmarketab...ng.png
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14-12-2022 23:03
Static task
static1
Behavioral task
behavioral1
Sample
RRFB17.vhd
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RRFB17.vhd
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
out.vhd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
out.vhd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
RR.lnk
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
RR.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
System Volume Information/WPSettings.dat
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
System Volume Information/WPSettings.dat
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
unmarketable/awed.gif
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
unmarketable/awed.gif
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
unmarketable/condone.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
unmarketable/condone.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
unmarketable/dislodging.gif
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
unmarketable/dislodging.gif
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
unmarketable/embedding.txt
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
unmarketable/embedding.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
unmarketable/multifarious.cmd
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
unmarketable/multifarious.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
unmarketable/placeable.cmd
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
unmarketable/placeable.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
unmarketable/profitable.jpg
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
unmarketable/profitable.jpg
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
unmarketable/strewing.png
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
unmarketable/strewing.png
Resource
win10v2004-20220812-en
General
-
Target
System Volume Information/WPSettings.dat
-
Size
12B
-
MD5
f456cb83106c0382caee7c7c082be1eb
-
SHA1
47198ee4dccf95bb770b5027c7804c0111398e5c
-
SHA256
260fa7ee11a84195a4221c0d245ac49af14f5c9b73df7ae9c8a8d06e82690d4e
-
SHA512
33897c18f4337aed4db5e73cddc985eed5e3449181042e0906757acb644d5bd7688840b35397e7bbd56b78545e078dbe1109dbbe9ebbff36a6de6e839d120827
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.dat\ = "dat_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\.dat rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\dat_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 1820 AcroRd32.exe 1820 AcroRd32.exe 1820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 948 wrote to memory of 560 948 cmd.exe rundll32.exe PID 948 wrote to memory of 560 948 cmd.exe rundll32.exe PID 948 wrote to memory of 560 948 cmd.exe rundll32.exe PID 560 wrote to memory of 1820 560 rundll32.exe AcroRd32.exe PID 560 wrote to memory of 1820 560 rundll32.exe AcroRd32.exe PID 560 wrote to memory of 1820 560 rundll32.exe AcroRd32.exe PID 560 wrote to memory of 1820 560 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"3⤵
- Suspicious use of SetWindowsHookEx