Overview
overview
10Static
static
RRFB17.vhd
windows7-x64
3RRFB17.vhd
windows10-2004-x64
3out.vhd
windows7-x64
1out.vhd
windows10-2004-x64
1RR.lnk
windows7-x64
10RR.lnk
windows10-2004-x64
10System Vol...gs.dat
windows7-x64
3System Vol...gs.dat
windows10-2004-x64
3unmarketable/awed.gif
windows7-x64
1unmarketable/awed.gif
windows10-2004-x64
1unmarketab...ne.dll
windows7-x64
10unmarketab...ne.dll
windows10-2004-x64
10unmarketab...ng.gif
windows7-x64
1unmarketab...ng.gif
windows10-2004-x64
1unmarketab...ng.txt
windows7-x64
1unmarketab...ng.txt
windows10-2004-x64
1unmarketab...us.cmd
windows7-x64
1unmarketab...us.cmd
windows10-2004-x64
1unmarketab...le.cmd
windows7-x64
1unmarketab...le.cmd
windows10-2004-x64
1unmarketab...le.jpg
windows7-x64
3unmarketab...le.jpg
windows10-2004-x64
3unmarketab...ng.png
windows7-x64
3unmarketab...ng.png
windows10-2004-x64
3Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2022 23:03
Static task
static1
Behavioral task
behavioral1
Sample
RRFB17.vhd
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
RRFB17.vhd
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
out.vhd
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
out.vhd
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
RR.lnk
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
RR.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
System Volume Information/WPSettings.dat
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
System Volume Information/WPSettings.dat
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
unmarketable/awed.gif
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
unmarketable/awed.gif
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
unmarketable/condone.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
unmarketable/condone.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
unmarketable/dislodging.gif
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
unmarketable/dislodging.gif
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
unmarketable/embedding.txt
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
unmarketable/embedding.txt
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
unmarketable/multifarious.cmd
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
unmarketable/multifarious.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
unmarketable/placeable.cmd
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
unmarketable/placeable.cmd
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
unmarketable/profitable.jpg
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
unmarketable/profitable.jpg
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
unmarketable/strewing.png
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
unmarketable/strewing.png
Resource
win10v2004-20220812-en
General
-
Target
System Volume Information/WPSettings.dat
-
Size
12B
-
MD5
f456cb83106c0382caee7c7c082be1eb
-
SHA1
47198ee4dccf95bb770b5027c7804c0111398e5c
-
SHA256
260fa7ee11a84195a4221c0d245ac49af14f5c9b73df7ae9c8a8d06e82690d4e
-
SHA512
33897c18f4337aed4db5e73cddc985eed5e3449181042e0906757acb644d5bd7688840b35397e7bbd56b78545e078dbe1109dbbe9ebbff36a6de6e839d120827
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2200 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"1⤵
- Modifies registry class
PID:1080
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2200