Overview
overview
10Static
static
10Srenshare ...in.lnk
windows7-x64
3Srenshare ...in.lnk
windows10-2004-x64
3Srenshare ...es.lnk
windows7-x64
3Srenshare ...es.lnk
windows10-2004-x64
3Srenshare ...ns.lnk
windows7-x64
3Srenshare ...ns.lnk
windows10-2004-x64
7Srenshare ...os.lnk
windows7-x64
3Srenshare ...os.lnk
windows10-2004-x64
7Srenshare ...ch.lnk
windows7-x64
3Srenshare ...ch.lnk
windows10-2004-x64
3Srenshare ...mp.lnk
windows7-x64
3Srenshare ...mp.lnk
windows10-2004-x64
3Srenshare ...SS.exe
windows7-x64
3Srenshare ...SS.exe
windows10-2004-x64
3Srenshare ...up.exe
windows7-x64
7Srenshare ...up.exe
windows10-2004-x64
7Srenshare ...s-.url
windows7-x64
1Srenshare ...s-.url
windows10-2004-x64
1Srenshare ...1).exe
windows7-x64
7Srenshare ...1).exe
windows10-2004-x64
7Srenshare ...ew.exe
windows7-x64
6Srenshare ...ew.exe
windows10-2004-x64
6Srenshare ...in.exe
windows7-x64
5Srenshare ...in.exe
windows10-2004-x64
7Srenshare ... 2.lnk
windows7-x64
3Srenshare ... 2.lnk
windows10-2004-x64
3Srenshare ...er.exe
windows7-x64
9Srenshare ...er.exe
windows10-2004-x64
9Srenshare ...ew.exe
windows7-x64
6Srenshare ...ew.exe
windows10-2004-x64
6Srenshare ...ew.exe
windows7-x64
9Srenshare ...ew.exe
windows10-2004-x64
9Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2023 01:36
Behavioral task
behavioral1
Sample
Srenshare tool/Atajos/$Recycle.Bin.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Srenshare tool/Atajos/$Recycle.Bin.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Srenshare tool/Atajos/Elementos recientes.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Srenshare tool/Atajos/Elementos recientes.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Srenshare tool/Atajos/Folder Options.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Srenshare tool/Atajos/Folder Options.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Srenshare tool/Atajos/Iconos.lnk
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
Srenshare tool/Atajos/Iconos.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Srenshare tool/Atajos/Prefetch.lnk
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Srenshare tool/Atajos/Prefetch.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Srenshare tool/Atajos/Temp.lnk
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Srenshare tool/Atajos/Temp.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Srenshare tool/LandSS.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
Srenshare tool/LandSS.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Srenshare tool/Tools/Everything-1.4.1.935.x86-Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Srenshare tool/Tools/Everything-1.4.1.935.x86-Setup.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
Srenshare tool/Tools/Jitter Click Training-How fast can you click in 10 seconds-.url
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Srenshare tool/Tools/Jitter Click Training-How fast can you click in 10 seconds-.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
Srenshare tool/Tools/Kangaroo (1).exe
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
Srenshare tool/Tools/Kangaroo (1).exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
Srenshare tool/Tools/LastActivityView.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
Srenshare tool/Tools/LastActivityView.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Srenshare tool/Tools/Paladin.exe
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
Srenshare tool/Tools/Paladin.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
Srenshare tool/Tools/Process Hacker 2.lnk
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Srenshare tool/Tools/Process Hacker 2.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
Srenshare tool/Tools/RegScanner.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
Srenshare tool/Tools/RegScanner.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
Srenshare tool/Tools/USBDeview.exe
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
Srenshare tool/Tools/USBDeview.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral31
Sample
Srenshare tool/Tools/UserAssistView.exe
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
Srenshare tool/Tools/UserAssistView.exe
Resource
win10v2004-20220812-en
General
-
Target
Srenshare tool/LandSS.exe
-
Size
2.0MB
-
MD5
6045504495a95cabe75d0f76f01f505a
-
SHA1
9110a9336433e8eb218096a80be7253245cf1075
-
SHA256
0483c0d37efd42d8c95fe962a67103b2d66db38cf0f4e5842ea6686434972cb8
-
SHA512
fe18cd913811bc716b55a0afb56e5db22d41716972f9a46b845b7b63be0a9559c03af5015b1246b2ff4f744a1939585c60fbfbeecf161e8b28f174be89f9673f
-
SSDEEP
49152:APEpksGULjU7cAGVRHxOOonAjZPeDaAVDjzP/V/Od:AcpkCfUIvVRjoSZCzVmd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
LandSS.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 LandSS.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString LandSS.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
LandSS.exepid process 1396 LandSS.exe 1396 LandSS.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
LandSS.exepid process 4696 LandSS.exe 4696 LandSS.exe 4696 LandSS.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
LandSS.exepid process 4696 LandSS.exe 4696 LandSS.exe 4696 LandSS.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
LandSS.exedescription pid process target process PID 836 wrote to memory of 1396 836 LandSS.exe LandSS.exe PID 836 wrote to memory of 1396 836 LandSS.exe LandSS.exe PID 836 wrote to memory of 1396 836 LandSS.exe LandSS.exe PID 836 wrote to memory of 4696 836 LandSS.exe LandSS.exe PID 836 wrote to memory of 4696 836 LandSS.exe LandSS.exe PID 836 wrote to memory of 4696 836 LandSS.exe LandSS.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe"C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe"C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe"C:\Users\Admin\AppData\Local\Temp\Srenshare tool\LandSS.exe" --local-control2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4696
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5224996e9b9c7ecfcf58bb668019d2492
SHA1812a7a2bff7d7138b4e378644f93e557f705a5f5
SHA256676f57fe0057bf395b05855ca2a9e61dff9d995f37f7f553e98200b2be0408fc
SHA512dbd4616538345fe0d1d54fe8ab9b86dee78a8a18f57af2b359104ff7593d2b0fe2b1a946374aa70ea08e11aab3287d5c28072d1ba5d6d95e90696f7acdf071a1
-
Filesize
6KB
MD576ceb4599c3b5512a4d5511fb2a958dd
SHA1fa566956a648cfd2d1a0a59ea0de8952d99af03e
SHA2569c238c54572e3272a7765320dc4e7b4e56db0bca921d1f7d1174edfc7a5ecc78
SHA512c80c2ff113a791e722f4caa0643f25a7bed969305ee9007fc54836b1fd8740c327a3dac93f1d886f0002d806c562f812ea0220d84228010e2ea45165a024e615
-
Filesize
2KB
MD550147eeca1516756fa27ff49b204f6ab
SHA122fffc4fb6cf11e5bea3e1636c500972cb704666
SHA256688eb835aeb6b6c6887b83da0d42e21d63393f47f2799db6429a779ed5f9a0fb
SHA5121be0a0a18dba99116db00164f19ea77d17a484c04cdc06a33d231349c224a9dc86999c908c9c46fb9bd649d2eb6afb69bc5406db2a987b4ed450239a89951c12
-
Filesize
105B
MD5e29f11d7b378eeb1ba736c950dd00f5c
SHA1278f415499b9a36576dd0fd94ffc9bc858f24187
SHA2568f579fe5ec8d32c6e6db4b0e07e7a6219ef886b3e2434894fbb8ad522a8a0891
SHA51259db83cd2785d350ca3707768abdfe912f3088aa3fa55d1e275526bdf4be22be05dae3fa662437c5e374693bf1c3417c56c7a7b06e5ebf6fcf49e6583e4a154f
-
Filesize
113B
MD53ce4317d6bf7ac8cbe15a040944cb1e7
SHA1f64b2cf8af896d30b9564652e8cfd3c8ca3f0495
SHA25610892dc7173a0398500c6c4f8eba2952510cae5564dee7a8dd40ea654fc6ab7b
SHA51260ab48fc431e0208c2158ff59c923fbc84e2eb475fbfea4b881851e3f43fc890baf86fecbbd3ec12ae1d85b38c1b3538d2f7611c97e666a5fcad385808865edd
-
Filesize
132B
MD5123c524682c9ff72ec7924efdb41b28c
SHA11e696d9f3e2bf149773186496c7ab9d5df35f9dd
SHA256e67a68c5e7fa7d227a2fbdd50789472dbbf58471664b1d9b776a579de2757ff6
SHA512676e5e2c4ff76b1942c1013a7ee9cd88b42424798e07c699c0cb534575bf4f6908366fe9c9a7e17d81e3f2209bf3fd7dd31463cdab5eea5d19475c10c00f696b