Overview
overview
8Static
static
8Microsoft ...s!.url
windows7-x64
1Microsoft ...s!.url
windows10-2004-x64
1Microsoft ...ll.exe
windows7-x64
8Microsoft ...ll.exe
windows10-2004-x64
Microsoft ...pp.exe
windows7-x64
1Microsoft ...pp.exe
windows10-2004-x64
1Microsoft ...00.dll
windows7-x64
3Microsoft ...00.dll
windows10-2004-x64
3Microsoft ...pp.exe
windows7-x64
1Microsoft ...pp.exe
windows10-2004-x64
1Microsoft ...00.dll
windows7-x64
3Microsoft ...00.dll
windows10-2004-x64
3Microsoft ...be.url
windows7-x64
1Microsoft ...be.url
windows10-2004-x64
1Analysis
-
max time kernel
20s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2023 03:26
Behavioral task
behavioral1
Sample
Microsoft Office 2019 + Licencia/Descarga Más Programas Gratis!.url
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Microsoft Office 2019 + Licencia/Descarga Más Programas Gratis!.url
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Microsoft Office 2019 + Licencia/Office/OInstall.exe
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Microsoft Office 2019 + Licencia/Office/OInstall.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Microsoft Office 2019 + Licencia/Office/files/x64/cleanospp.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Microsoft Office 2019 + Licencia/Office/files/x64/cleanospp.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Microsoft Office 2019 + Licencia/Office/files/x64/msvcr100.dll
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
Microsoft Office 2019 + Licencia/Office/files/x64/msvcr100.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
Microsoft Office 2019 + Licencia/Office/files/x86/cleanospp.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Microsoft Office 2019 + Licencia/Office/files/x86/cleanospp.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Microsoft Office 2019 + Licencia/Office/files/x86/msvcr100.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Microsoft Office 2019 + Licencia/Office/files/x86/msvcr100.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
Microsoft Office 2019 + Licencia/Suscribete a Mi Canal de YouTube.url
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
Microsoft Office 2019 + Licencia/Suscribete a Mi Canal de YouTube.url
Resource
win10v2004-20220812-en
Errors
General
-
Target
Microsoft Office 2019 + Licencia/Office/OInstall.exe
-
Size
9.5MB
-
MD5
f71556138c9eb716330063156db4a6bc
-
SHA1
bd91945d407cbeee830c15280c8324459f0ff61a
-
SHA256
41ff83c380b958e918c4061c02a6077590d7630a01d7f2f0f448dc1a6fbf284a
-
SHA512
259642e8b2398122f00b031f6af4e79a2cea0831b4ef00c0f118f1fd28d32c92122a118921ce2af915f141273a2774ccf9abdfdc596175ac3c190e8f891c139e
-
SSDEEP
196608:vp1crEM65aqMLvUcm+oz3BkeBTAUW24t13Dr7m0mitn2xe7gXQZ+3jeRBTfYNCH1:hurEzabjm+4keB0vt1Dr7m0mc2xe7gAN
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/4736-132-0x0000000000400000-0x00000000015B4000-memory.dmp upx behavioral4/memory/4736-134-0x0000000000400000-0x00000000015B4000-memory.dmp upx behavioral4/memory/4736-135-0x0000000000400000-0x00000000015B4000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "240" LogonUI.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4092 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4736 wrote to memory of 672 4736 OInstall.exe 81 PID 4736 wrote to memory of 672 4736 OInstall.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Office 2019 + Licencia\Office\OInstall.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Office 2019 + Licencia\Office\OInstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\cmd.exe"C:\Windows\Sysnative\cmd.exe" /D /c copy C:\Windows\system32\Tasks\OInstall "C:\Windows\Temp\OInstall.tmp" /Y2⤵PID:672
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39d7055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4092