Analysis
-
max time kernel
600s -
max time network
413s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
19-12-2022 00:21
Static task
static1
Behavioral task
behavioral1
Sample
Bitcoin Bull Prediction.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
Bitcoin Bull Prediction.exe
Resource
win7-20220901-en
Behavioral task
behavioral3
Sample
Bitcoin Bull Prediction.pdf
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
Bitcoin Bull Prediction.pdf
Resource
win7-20221111-en
Behavioral task
behavioral5
Sample
Dump.bin
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
Dump.bin
Resource
win7-20221111-en
General
-
Target
Dump.bin
-
Size
172KB
-
MD5
b1b29c275ca44faad9d22ca436468ecd
-
SHA1
e368b4ddfd8fcd30c21f690b83fdf6abdebae80b
-
SHA256
ab31b0cb796b3ae001fb4d12d9cac8c98911e11322cb974bf8d2be9303259a5e
-
SHA512
7b72c03f62c6759d72d2ca7c9090083966f981b6ef62166a6f5afef57bc52464e5143c61697d7c80b17288217a6808915a58b51bfe43f6e3e4d546fdfbaded83
-
SSDEEP
3072:Q82l42IQ+0Gh/CX8bYS3oAlobjUgS0cRilFxfiHNSXcJiB5CT01bDmDxWaB47uel:Q82lShBC41SFL1LjO5o
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\bin_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\.bin rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\bin_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\bin_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\bin_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\.bin\ = "bin_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\bin_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000_CLASSES\bin_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 876 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 876 AcroRd32.exe 876 AcroRd32.exe 876 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1344 wrote to memory of 460 1344 cmd.exe 29 PID 1344 wrote to memory of 460 1344 cmd.exe 29 PID 1344 wrote to memory of 460 1344 cmd.exe 29 PID 460 wrote to memory of 876 460 rundll32.exe 30 PID 460 wrote to memory of 876 460 rundll32.exe 30 PID 460 wrote to memory of 876 460 rundll32.exe 30 PID 460 wrote to memory of 876 460 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Dump.bin1⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Dump.bin2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Dump.bin"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:876
-
-