Resubmissions

03-02-2023 17:43

230203-wa1m5agd53 9

03-02-2023 17:32

230203-v4ky4abg91 3

Analysis

  • max time kernel
    285s
  • max time network
    319s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-02-2023 17:32

General

  • Target

    WS.Filmora.11.7.3.814.w64.rar

  • Size

    471.9MB

  • MD5

    4c80d5d58c201cb78fd5af10000cf85d

  • SHA1

    041356b6fee6ebcde2a769c43d3c99afa22f5c6d

  • SHA256

    4a386815be0781d9ec8defe96bf6818f196b28a1c484357733b13bd8804f2f85

  • SHA512

    3240123d22aeeca127b75804657ef83882738f77ec6beaec4a41a860d2e2b02395ea73857e15b9b225d0a3c922c5b918bdfadd408a89e43884b0f61206dcad27

  • SSDEEP

    12582912:MZDK+XshsBiG+0e5yb/ORHC0WO9sjzUV4s7AesKarfAn1eqtlju:EDK+cSiGR5b/wi0W0lV1Mes1Angula

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\WS.Filmora.11.7.3.814.w64.rar
    1⤵
    • Modifies registry class
    PID:3496
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3480
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:516
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\WS.Filmora.11.7.3.814.w64\" -ad -an -ai#7zMap31443:130:7zEvent12790
      1⤵
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:5092
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\WS.Filmora.11.7.3.814.w64\" -ad -an -ai#7zMap21543:130:7zEvent7152
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:4452

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

      Filesize

      28KB

      MD5

      0028c5c8f83da5fc83c0776186db2188

      SHA1

      6158a26d27aef059b7d1917f22dc090f3a28e0d2

      SHA256

      3c7a8ea05e4677cca5266e781a92f6cb8e56dcc642fead97738cbf2ddb65f981

      SHA512

      d451191c4d2370693c077172b9011345cbb36e3507dc4b3f306929b22d982f0cfa75effc78d4f4829c36ccc39fe86166e2f265e1052d5721c0bb41c2b8bf5d23