Analysis

  • max time kernel
    75s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2023, 17:05

General

  • Target

    https://github.com/ytisf/theZoo/raw/master/malware/Binaries/Trivial.LSD/Trivial.LSD.zip

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Modifies registry class 25 IoCs
  • Opens file in notepad (likely ransom note) 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/ytisf/theZoo/raw/master/malware/Binaries/Trivial.LSD/Trivial.LSD.zip
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1496
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0xc4
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1092
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Temp1_Ansi.Lsd.zip\LSD.ANS
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_Ansi.Lsd.zip\LSD.ANS
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:1988
  • C:\Windows\system32\rundll32.exe
    "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\deployment.properties
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\deployment.properties
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:996
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:308

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z4TAQ562\Trivial.LSD.zip.d090nm1.partial

            Filesize

            3KB

            MD5

            9dbfa879457bf368718b5e88d05dfbe1

            SHA1

            5ef6056e65d7ae41a2e82a772a9b0f454b4cf9f8

            SHA256

            dd3ea1671ea39168b6b30d60b507f326cab3c7d2c814298447175f7adf55b948

            SHA512

            1c71e23ff7eee052895eb59d2e44be2759194f765bf9c0540e7e2a94cfd68dcc0e4a7fb49b70effdb91d91415e431e4693d1b5b9df66d0664eb07ddce55cac96

          • memory/1216-55-0x000007FEFB9E1000-0x000007FEFB9E3000-memory.dmp

            Filesize

            8KB