Resubmissions
14-02-2023 14:03
230214-rcwpqsdh68 114-02-2023 14:02
230214-rchg4sdh64 114-02-2023 14:00
230214-rbfbcsdh55 3Analysis
-
max time kernel
54s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14-02-2023 14:00
Static task
static1
Behavioral task
behavioral1
Sample
uozqIDJQikBkuDxDgluuWeb220.prx
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
uozqIDJQikBkuDxDgluuWeb220.prx
Resource
win10v2004-20221111-en
General
-
Target
uozqIDJQikBkuDxDgluuWeb220.prx
-
Size
475KB
-
MD5
e5d8e05ba590d7240569ce05514b3377
-
SHA1
2fc78531c797ca0ee25f1ac06bd576e446fb53d4
-
SHA256
f08e988868a2471178c8c1c432f1691dd48f2ca976a935958a233621b80b679c
-
SHA512
062332bc091a3b5acdbc27cee681276507081231c78106af628e60ec024b89c967b1574b740c708777d50853dcb779e78ce6d56b4c8cd0fe04d8f2cc191c1d31
-
SSDEEP
12288:aeZZHKG4zspGLakaaq9oWdNvLLpL5VwpKY2f6aXV:awHj4zHiaTWPBIpRD+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 688 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 292 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 292 1756 cmd.exe 29 PID 1756 wrote to memory of 292 1756 cmd.exe 29 PID 1756 wrote to memory of 292 1756 cmd.exe 29 PID 292 wrote to memory of 688 292 rundll32.exe 30 PID 292 wrote to memory of 688 292 rundll32.exe 30 PID 292 wrote to memory of 688 292 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\uozqIDJQikBkuDxDgluuWeb220.prx1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\uozqIDJQikBkuDxDgluuWeb220.prx2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\uozqIDJQikBkuDxDgluuWeb220.prx3⤵
- Opens file in notepad (likely ransom note)
PID:688
-
-