Overview
overview
10Static
static
19146083837.zip
windows7-x64
19146083837.zip
windows10-2004-x64
16b310d2dfc...a5.zip
windows7-x64
16b310d2dfc...a5.zip
windows10-2004-x64
11ZUSEWYOK0...pt.vhd
windows7-x64
31ZUSEWYOK0...pt.vhd
windows10-2004-x64
31ZUSEWYOK0...ipt.js
windows7-x64
101ZUSEWYOK0...ipt.js
windows10-2004-x64
10System Vol...gs.dat
windows7-x64
3System Vol...gs.dat
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13-02-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
9146083837.zip
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9146083837.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
6b310d2dfcf461efdf51d7aa156cabcf75b74a8eef838c2fd32a1018baabd2a5.zip
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
6b310d2dfcf461efdf51d7aa156cabcf75b74a8eef838c2fd32a1018baabd2a5.zip
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
1ZUSEWYOK07HKSA-Payment_Receipt.vhd
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
1ZUSEWYOK07HKSA-Payment_Receipt.vhd
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
1ZUSEWYOK07HKSA-Payment_Receipt.js
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
1ZUSEWYOK07HKSA-Payment_Receipt.js
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
System Volume Information/WPSettings.dat
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
System Volume Information/WPSettings.dat
Resource
win10v2004-20220812-en
General
-
Target
System Volume Information/WPSettings.dat
-
Size
12B
-
MD5
a9ef3aa2e3d9657648d5e3c17d24978a
-
SHA1
58d8998481c30413fb624f7425922bdd4fb25645
-
SHA256
43fa536aa01e49280fc1fe0a570df38cf7e87f8104a5a51ce98f5cbef2b99cbf
-
SHA512
643d7b7f3b688d55f4f18956fa976c904ac8ce658e11ce7f4f2f49faba5f514482a3d86402c991df537fd8a53c74abc61569334592fc2f011d2360cbb1f5b3ef
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\dat_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\dat_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.dat\ = "dat_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\dat_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\dat_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.dat rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\dat_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\dat_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1680 AcroRd32.exe 1680 AcroRd32.exe 1680 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 388 2036 cmd.exe 28 PID 2036 wrote to memory of 388 2036 cmd.exe 28 PID 2036 wrote to memory of 388 2036 cmd.exe 28 PID 388 wrote to memory of 1680 388 rundll32.exe 29 PID 388 wrote to memory of 1680 388 rundll32.exe 29 PID 388 wrote to memory of 1680 388 rundll32.exe 29 PID 388 wrote to memory of 1680 388 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\System Volume Information\WPSettings.dat"3⤵
- Suspicious use of SetWindowsHookEx
PID:1680
-
-