Analysis
-
max time kernel
72s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2022, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
Desktop.rar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Desktop.rar
Resource
win10v2004-20220901-en
General
-
Target
Desktop.rar
-
Size
1KB
-
MD5
3085f3f29c18f0a8e1eba9a51488fc2f
-
SHA1
c72aeafe0bce67bd984451c342858d498c09825e
-
SHA256
5edc6eee6e2369444b1107a20f48c56e5236bb630b1c064b30e5a6e45b55bad8
-
SHA512
de6d23d8fec4e7c8d6a86d54e4844c66162869b02876917b876e7219c77926dfe1e1482c94ece34c3faa1cffb58f6555bbb4cfe48de30f5082534edd1fd65be8
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\ReadMe.LOCKEDFILECR.txt
http://i6zulsy4dscbshpmb7nyftunojse37fw6x3m4w3ccv5uucjiwkawctad.onion/54df3baef130c81e6ae8432a2567320a/
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\.rar OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3608 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3608 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 3748 7zG.exe Token: 35 3748 7zG.exe Token: SeSecurityPrivilege 3748 7zG.exe Token: SeSecurityPrivilege 3748 7zG.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3608 vlc.exe 3608 vlc.exe 3608 vlc.exe 3608 vlc.exe 3748 7zG.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3608 vlc.exe 3608 vlc.exe 3608 vlc.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3276 OpenWith.exe 3608 vlc.exe 4772 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3608 3276 OpenWith.exe 88 PID 3276 wrote to memory of 3608 3276 OpenWith.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Desktop.rar1⤵
- Modifies registry class
PID:4996
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Desktop.rar"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3608
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3856
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\" -an -ai#7zMap11357:94:7zEvent257521⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3748
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4772