Analysis
-
max time kernel
2s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-01-2023 07:19
Static task
static1
Behavioral task
behavioral1
Sample
fakeobs.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fakeobs/7z2201-x64.exe
Resource
win7-20221111-en
Behavioral task
behavioral3
Sample
fakeobs/fake-obs.rar
Resource
win7-20220812-en
General
-
Target
fakeobs/fake-obs.rar
-
Size
14.6MB
-
MD5
3042215ebeefb5aae8808afc228771c9
-
SHA1
4cd97d264155e2605880e138e33b8c50cebe24ee
-
SHA256
dd17f2803a4332398dcada5ce9abfa246241b14bc9c250fbada5ecf5d6e38da7
-
SHA512
25e64453d5224f56f46a73e8c2c64da12fe508357c0ffa3ef992b140ccd1fec30582a9f15a4030a6f11f9b653d3abc16454e3ee592bda40475efc716210f3f6c
-
SSDEEP
393216:SblI9gCds0xuDDAQLq5OP7E0y+gtT2ppkMkK9Gbw27T+6j:Sbl/gxqD/L+j0y+E2kMV9GbT7SE
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1236 wrote to memory of 940 1236 cmd.exe rundll32.exe PID 1236 wrote to memory of 940 1236 cmd.exe rundll32.exe PID 1236 wrote to memory of 940 1236 cmd.exe rundll32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fakeobs\fake-obs.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fakeobs\fake-obs.rar2⤵
- Modifies registry class
PID:940