Overview
overview
10Static
static
19146083837.zip
windows7-x64
19146083837.zip
windows10-2004-x64
16b310d2dfc...a5.zip
windows7-x64
16b310d2dfc...a5.zip
windows10-2004-x64
11ZUSEWYOK0...pt.vhd
windows7-x64
31ZUSEWYOK0...pt.vhd
windows10-2004-x64
31ZUSEWYOK0...ipt.js
windows7-x64
101ZUSEWYOK0...ipt.js
windows10-2004-x64
10System Vol...gs.dat
windows7-x64
3System Vol...gs.dat
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-02-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
9146083837.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9146083837.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
6b310d2dfcf461efdf51d7aa156cabcf75b74a8eef838c2fd32a1018baabd2a5.zip
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
6b310d2dfcf461efdf51d7aa156cabcf75b74a8eef838c2fd32a1018baabd2a5.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
1ZUSEWYOK07HKSA-Payment_Receipt.vhd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
1ZUSEWYOK07HKSA-Payment_Receipt.vhd
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
1ZUSEWYOK07HKSA-Payment_Receipt.js
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
1ZUSEWYOK07HKSA-Payment_Receipt.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
System Volume Information/WPSettings.dat
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
System Volume Information/WPSettings.dat
Resource
win10v2004-20220812-en
General
-
Target
1ZUSEWYOK07HKSA-Payment_Receipt.vhd
-
Size
6.0MB
-
MD5
d85f12e9ce7de83d8163bc68d4366ae8
-
SHA1
755414bde4e6c023da1a3b45e3dbfe463e932ef9
-
SHA256
554f2986118eacbe2a162883e2396ac4be1bc2d1fdf51a6fe7867eb4ef58ac21
-
SHA512
3c6a0599ab3795db92b35dadf7131e40512d791124d27c028b3ec5211c0031c11fb27c01a82adf936586131d59f456aff438641882b5a4a5a821f6427d97dae3
-
SSDEEP
12288:3b9Xn7Mu3qI70c9viIRub9Xn7Mu3qI70c9viIR:3JX7MA0c9vxkJX7MA0c9vx
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1380 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1380 1896 cmd.exe 29 PID 1896 wrote to memory of 1380 1896 cmd.exe 29 PID 1896 wrote to memory of 1380 1896 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1ZUSEWYOK07HKSA-Payment_Receipt.vhd1⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\1ZUSEWYOK07HKSA-Payment_Receipt.vhd2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1380
-