Overview
overview
10Static
static
10SS Tools SafePvP.rar
windows10-1703-x64
3Srenshare ...os.lnk
windows10-1703-x64
3Srenshare ...mp.lnk
windows10-1703-x64
3Srenshare ...SS.exe
windows10-1703-x64
3Srenshare ...up.exe
windows10-1703-x64
7Srenshare ...s-.url
windows10-1703-x64
1Srenshare ...1).exe
windows10-1703-x64
7Srenshare ...ew.exe
windows10-1703-x64
6Srenshare ...in.exe
windows10-1703-x64
5Srenshare ... 2.lnk
windows10-1703-x64
3Srenshare ...er.exe
windows10-1703-x64
9Srenshare ...ew.exe
windows10-1703-x64
6Srenshare ...ew.exe
windows10-1703-x64
9Srenshare ....5.exe
windows10-1703-x64
4Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05-02-2023 01:39
Behavioral task
behavioral1
Sample
SS Tools SafePvP.rar
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
Srenshare tool/Atajos/Iconos.lnk
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
Srenshare tool/Atajos/Temp.lnk
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
Srenshare tool/LandSS.exe
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
Srenshare tool/Tools/Everything-1.4.1.935.x86-Setup.exe
Resource
win10-20220901-en
Behavioral task
behavioral6
Sample
Srenshare tool/Tools/Jitter Click Training-How fast can you click in 10 seconds-.url
Resource
win10-20220812-en
Behavioral task
behavioral7
Sample
Srenshare tool/Tools/Kangaroo (1).exe
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
Srenshare tool/Tools/LastActivityView.exe
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
Srenshare tool/Tools/Paladin.exe
Resource
win10-20220901-en
Behavioral task
behavioral10
Sample
Srenshare tool/Tools/Process Hacker 2.lnk
Resource
win10-20220812-en
Behavioral task
behavioral11
Sample
Srenshare tool/Tools/RegScanner.exe
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
Srenshare tool/Tools/USBDeview.exe
Resource
win10-20220901-en
Behavioral task
behavioral13
Sample
Srenshare tool/Tools/UserAssistView.exe
Resource
win10-20220812-en
Behavioral task
behavioral14
Sample
Srenshare tool/Tools/luyten-0.4.5.exe
Resource
win10-20220812-en
General
-
Target
Srenshare tool/LandSS.exe
-
Size
2.0MB
-
MD5
6045504495a95cabe75d0f76f01f505a
-
SHA1
9110a9336433e8eb218096a80be7253245cf1075
-
SHA256
0483c0d37efd42d8c95fe962a67103b2d66db38cf0f4e5842ea6686434972cb8
-
SHA512
fe18cd913811bc716b55a0afb56e5db22d41716972f9a46b845b7b63be0a9559c03af5015b1246b2ff4f744a1939585c60fbfbeecf161e8b28f174be89f9673f
-
SSDEEP
49152:APEpksGULjU7cAGVRHxOOonAjZPeDaAVDjzP/V/Od:AcpkCfUIvVRjoSZCzVmd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
LandSS.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LandSS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString LandSS.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
LandSS.exepid process 340 LandSS.exe 340 LandSS.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
LandSS.exepid process 5088 LandSS.exe 5088 LandSS.exe 5088 LandSS.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
LandSS.exepid process 5088 LandSS.exe 5088 LandSS.exe 5088 LandSS.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
LandSS.exedescription pid process target process PID 2728 wrote to memory of 340 2728 LandSS.exe LandSS.exe PID 2728 wrote to memory of 340 2728 LandSS.exe LandSS.exe PID 2728 wrote to memory of 340 2728 LandSS.exe LandSS.exe PID 2728 wrote to memory of 5088 2728 LandSS.exe LandSS.exe PID 2728 wrote to memory of 5088 2728 LandSS.exe LandSS.exe PID 2728 wrote to memory of 5088 2728 LandSS.exe LandSS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe"C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe"C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe"C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5088
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD55ecf50d7e0d386f8a773762ae4b9c04b
SHA135428051b8dbe83fd622e8a0838c9bab06c93013
SHA2564c9269a33f34a4d91de81dc73b952bd728304516fd7663f22b05e0d58d593700
SHA5127ab5f81c825a79659bef4f6d233d1c2b3ba1bd8817cfd573b6585c0cb017252cd5b24df62a83e14b11e29ae6cb87815aceed4d7f041c61444d4770ab3bf33b09
-
Filesize
6KB
MD55ecf50d7e0d386f8a773762ae4b9c04b
SHA135428051b8dbe83fd622e8a0838c9bab06c93013
SHA2564c9269a33f34a4d91de81dc73b952bd728304516fd7663f22b05e0d58d593700
SHA5127ab5f81c825a79659bef4f6d233d1c2b3ba1bd8817cfd573b6585c0cb017252cd5b24df62a83e14b11e29ae6cb87815aceed4d7f041c61444d4770ab3bf33b09
-
Filesize
2KB
MD564f2122170cdc39121fd3da52c1603b4
SHA1f7302ff3154c1efb63eaf025737563f575590bb8
SHA25630a63b2d89c21751f58a9c045b2b740b2eb55b524a7673f24eaf862fb5a66fec
SHA5127b97f2542bceca8f6769e827b59156172f8c70acb6b98f51c873cb573d9c18eb96d338809dfe7bbce87af9a20918c18edf626d158d35af5b8b3a98c2e8be6606
-
Filesize
105B
MD53b0046710a4fed609005dae07d6781a3
SHA1510b3c134bd83e5146022adf4e3297760aded0b6
SHA256fa927e73ad3da7c80411b068c27ae29f6c9db81b54906bac4d92e0169b5da35b
SHA5121885cff0a27be9ef7ce62aeef8bb869d26868eaa45b2a84fd5af1ed6fdf1dd64640530da2b80a4b6c81dce2cafcd50ab00ded0563410a8ee2bab5025751344e5
-
Filesize
113B
MD5b91f5309deff9ed4c6ad2ed8e2d482db
SHA10e46c97b30db71ba76c1acbcfb4fee8ecb47dac8
SHA2563e0f8227f5300e02e831993b90858c5121022a0cee6d989881a7ec37918d35ff
SHA512245749174304ab67631e277a8331d32a6d4255b724fce233c53dd21f5cf7ad21fdaa1442a3f63b2a14a1e7144a49cf63f9175512905086c5e53f2ba4c890253b
-
Filesize
132B
MD5123c524682c9ff72ec7924efdb41b28c
SHA11e696d9f3e2bf149773186496c7ab9d5df35f9dd
SHA256e67a68c5e7fa7d227a2fbdd50789472dbbf58471664b1d9b776a579de2757ff6
SHA512676e5e2c4ff76b1942c1013a7ee9cd88b42424798e07c699c0cb534575bf4f6908366fe9c9a7e17d81e3f2209bf3fd7dd31463cdab5eea5d19475c10c00f696b