Analysis

  • max time kernel
    80s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-02-2023 01:39

General

  • Target

    SS Tools SafePvP.rar

  • Size

    21.6MB

  • MD5

    168d85cb9b30c2065a2bdaf704b2ddef

  • SHA1

    4aed9ca176e5f9b9c5a5160cbb0b5c942ec59ea5

  • SHA256

    6cc0505bc3d39f9806d605ba115dd302da1f485554ec44c9c96286f5ea34d909

  • SHA512

    cd1bc78ee86480ac10f6af86254b4dd7f230d312ff403bd0dd32d910997de5bab79f3cc8a81862bdc268173e32d067179a74fd68616d90f445bc721eb2a64547

  • SSDEEP

    393216:na+3nVZeku6O6HTpwthhG239C8kQeJx8pYRdvptIQUmyjV7Cht74/YJbTZGRI:nPeILoYAAQeJxlpLyXyhGu

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\SS Tools SafePvP.rar"
    1⤵
    • Modifies registry class
    PID:2744
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Program Files\Windows NT\Accessories\WORDPAD.EXE
      "C:\Program Files\Windows NT\Accessories\WORDPAD.EXE" "C:\Users\Admin\AppData\Local\Temp\SS Tools SafePvP.rar"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2472
  • C:\Windows\system32\werfault.exe
    werfault.exe /h /shared Global\3780789c10094470a721f4446b80ddd7 /t 3732 /p 2472
    1⤵
      PID:4664

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2472-120-0x0000000000000000-mapping.dmp