Overview
overview
10Static
static
10Srenshare ...in.lnk
windows7-x64
3Srenshare ...in.lnk
windows10-2004-x64
3Srenshare ...es.lnk
windows7-x64
3Srenshare ...es.lnk
windows10-2004-x64
3Srenshare ...ns.lnk
windows7-x64
3Srenshare ...ns.lnk
windows10-2004-x64
7Srenshare ...os.lnk
windows7-x64
3Srenshare ...os.lnk
windows10-2004-x64
7Srenshare ...ch.lnk
windows7-x64
3Srenshare ...ch.lnk
windows10-2004-x64
3Srenshare ...mp.lnk
windows7-x64
3Srenshare ...mp.lnk
windows10-2004-x64
3Srenshare ...SS.exe
windows7-x64
3Srenshare ...SS.exe
windows10-2004-x64
3Srenshare ...up.exe
windows7-x64
7Srenshare ...up.exe
windows10-2004-x64
7Srenshare ...s-.url
windows7-x64
1Srenshare ...s-.url
windows10-2004-x64
1Srenshare ...1).exe
windows7-x64
7Srenshare ...1).exe
windows10-2004-x64
7Srenshare ...ew.exe
windows7-x64
6Srenshare ...ew.exe
windows10-2004-x64
6Srenshare ...in.exe
windows7-x64
5Srenshare ...in.exe
windows10-2004-x64
7Srenshare ... 2.lnk
windows7-x64
3Srenshare ... 2.lnk
windows10-2004-x64
3Srenshare ...er.exe
windows7-x64
9Srenshare ...er.exe
windows10-2004-x64
9Srenshare ...ew.exe
windows7-x64
6Srenshare ...ew.exe
windows10-2004-x64
6Srenshare ...ew.exe
windows7-x64
9Srenshare ...ew.exe
windows10-2004-x64
9Analysis
-
max time kernel
42s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-02-2023 01:36
Behavioral task
behavioral1
Sample
Srenshare tool/Atajos/$Recycle.Bin.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Srenshare tool/Atajos/$Recycle.Bin.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Srenshare tool/Atajos/Elementos recientes.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Srenshare tool/Atajos/Elementos recientes.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
Srenshare tool/Atajos/Folder Options.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Srenshare tool/Atajos/Folder Options.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Srenshare tool/Atajos/Iconos.lnk
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
Srenshare tool/Atajos/Iconos.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Srenshare tool/Atajos/Prefetch.lnk
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Srenshare tool/Atajos/Prefetch.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Srenshare tool/Atajos/Temp.lnk
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
Srenshare tool/Atajos/Temp.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Srenshare tool/LandSS.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
Srenshare tool/LandSS.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Srenshare tool/Tools/Everything-1.4.1.935.x86-Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Srenshare tool/Tools/Everything-1.4.1.935.x86-Setup.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral17
Sample
Srenshare tool/Tools/Jitter Click Training-How fast can you click in 10 seconds-.url
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Srenshare tool/Tools/Jitter Click Training-How fast can you click in 10 seconds-.url
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
Srenshare tool/Tools/Kangaroo (1).exe
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
Srenshare tool/Tools/Kangaroo (1).exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
Srenshare tool/Tools/LastActivityView.exe
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
Srenshare tool/Tools/LastActivityView.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Srenshare tool/Tools/Paladin.exe
Resource
win7-20221111-en
Behavioral task
behavioral24
Sample
Srenshare tool/Tools/Paladin.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral25
Sample
Srenshare tool/Tools/Process Hacker 2.lnk
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Srenshare tool/Tools/Process Hacker 2.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral27
Sample
Srenshare tool/Tools/RegScanner.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
Srenshare tool/Tools/RegScanner.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
Srenshare tool/Tools/USBDeview.exe
Resource
win7-20221111-en
Behavioral task
behavioral30
Sample
Srenshare tool/Tools/USBDeview.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral31
Sample
Srenshare tool/Tools/UserAssistView.exe
Resource
win7-20221111-en
Behavioral task
behavioral32
Sample
Srenshare tool/Tools/UserAssistView.exe
Resource
win10v2004-20220812-en
General
-
Target
Srenshare tool/Tools/Paladin.exe
-
Size
8.2MB
-
MD5
80efadf419e405d4a411d9d077a4f326
-
SHA1
7491cf5b3af1d765af40ea182f923cac40392a71
-
SHA256
673d13493ddcbb5f60c0d1d0db728cdd830857e46ecd73f6b9e277cfcf3ceefa
-
SHA512
5a765e126a2e047e05b27f7d324bd19b96f06dc32a2f603682705c794bbf1fe04bbfada3b5ec6907cd4137d3b31aeafff709e2994b6bb3aa40059d15c78144bf
-
SSDEEP
196608:lWvtYbs24beIZb4qj7A6o1tSSYj4WNNf+g5jny5mv68WHu6fyAB2V6gIYPc/2:hRUeChSm4WXmuTvv8yAcw8c/2
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Paladin.exepid process 1992 Paladin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
Paladin.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 Paladin.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 Paladin.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a Paladin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Paladin.exepid process 1992 Paladin.exe 1992 Paladin.exe 1992 Paladin.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 464 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Paladin.exedescription pid process Token: SeDebugPrivilege 1992 Paladin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Paladin.exedescription pid process target process PID 1992 wrote to memory of 1648 1992 Paladin.exe cmd.exe PID 1992 wrote to memory of 1648 1992 Paladin.exe cmd.exe PID 1992 wrote to memory of 1648 1992 Paladin.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Srenshare tool\Tools\Paladin.exe"C:\Users\Admin\AppData\Local\Temp\Srenshare tool\Tools\Paladin.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C echo Paladin 1.4.1 - Error & echo. & echo Failed to start kernel driver: -44 & echo. & pause2⤵PID:1648
-