Analysis
-
max time kernel
139s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
21-02-2023 07:54
Static task
static1
Behavioral task
behavioral1
Sample
Zip/7z2201-x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Zip/7z2201-x64.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Zip/S0ftware-2023.rar
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Zip/S0ftware-2023.rar
Resource
win10v2004-20230220-en
General
-
Target
Zip/S0ftware-2023.rar
-
Size
20.0MB
-
MD5
8fd7325fb9bb7438ef7c4a03ee773ff3
-
SHA1
ba056d2bf72b75bd3f354aa3aac13741e2faeac0
-
SHA256
f40319abf90d7f6285508f79f9cd683ed40095d1e92195e17f709645d5f086d3
-
SHA512
e6132218a3779400e7c7aa53acb2aeae08bdc53409d562e25ed98beccca82aec2a4eb0df16c64d6d31d153c74f3fea51f085f308abeb11dd4718476ce4fc5f16
-
SSDEEP
393216:rWpLAc17i4XaRbEXuj/j5R+c/9StwP49HMNBhvCAzdrkDGY6iT4BHVQ9:k1OvbEWDVVSKvBRdNb5BHVK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 1792 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 1792 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
vlc.exepid process 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
vlc.exepid process 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe 1792 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 1792 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 928 wrote to memory of 576 928 cmd.exe rundll32.exe PID 928 wrote to memory of 576 928 cmd.exe rundll32.exe PID 928 wrote to memory of 576 928 cmd.exe rundll32.exe PID 576 wrote to memory of 1792 576 rundll32.exe vlc.exe PID 576 wrote to memory of 1792 576 rundll32.exe vlc.exe PID 576 wrote to memory of 1792 576 rundll32.exe vlc.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Zip\S0ftware-2023.rar1⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Zip\S0ftware-2023.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Zip\S0ftware-2023.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1792