Resubmissions
12/02/2023, 17:53
230212-wgcjwaeh7y 3Analysis
-
max time kernel
12s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/02/2023, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
Internalinject0r_.rar
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Internalinject0r_.rar
Resource
win10v2004-20220812-en
General
-
Target
Internalinject0r_.rar
-
Size
394KB
-
MD5
8f3906360aba70dbd7e2547d880e393e
-
SHA1
b483f1586921f59ebe88749902588263416797c1
-
SHA256
34ae837afc5d91e4ec0f680dcea462ee9d2573df4942c0f0ba7a6248ca14e041
-
SHA512
433220aa62b4e0ab786a43147b4f98af166a5c5a059f27ec601a4baca0f0047c3cd7b86fd7da8d95997eb86828bc93ce13b071f1bdf9ca71e0d682e8ced7f22d
-
SSDEEP
6144:dsKoJTCG5DQvjPxkLKJFlHNz+EVdYIF9eSECmDp9iNucqf8ti5wBoSiX/o:OKb4DQL+K3dNrVdYMErDCkcqkoPSiXw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1756 2012 cmd.exe 28 PID 2012 wrote to memory of 1756 2012 cmd.exe 28 PID 2012 wrote to memory of 1756 2012 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Internalinject0r_.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Internalinject0r_.rar2⤵
- Modifies registry class
PID:1756
-