Analysis
-
max time kernel
1392s -
max time network
1219s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2023 21:43
Static task
static1
Behavioral task
behavioral1
Sample
Info.nfo
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
THEPIRATEBAY.ORG.url
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
data.dat
Resource
win10v2004-20230220-en
General
-
Target
data.dat
-
Size
30.0MB
-
MD5
5b4fe8caa826721d851e10bc7e9b73d0
-
SHA1
9fd6f1829d6757761d2f875ae6fccc9892a61188
-
SHA256
a829d08eac5339bd6941a598d09e5402a677ed5d3164ed8a9ffa277b8f6fdb0d
-
SHA512
64ffde1ac11470ff51249e518fd6983625f105f4dbe1e24ba3ff17f2338a703f458a7bf2b7e7457a76632f9a28c6378c565d83d130572837639b33e735a9eeaf
-
SSDEEP
6144:7TTSTiTTTSTTTSTiTTTSTTTSTiTTTSTTTSTiTTTSTTTSTiTTTSTTTSTiTTTSTTTq:C
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2164 2404 WerFault.exe 95 -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2056 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4632 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe 4632 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4632 wrote to memory of 2056 4632 OpenWith.exe 101 PID 4632 wrote to memory of 2056 4632 OpenWith.exe 101
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\data.dat1⤵
- Modifies registry class
PID:3640
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\data.dat2⤵
- Opens file in notepad (likely ransom note)
PID:2056
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 480 -p 2404 -ip 24041⤵PID:1628
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2404 -s 17801⤵
- Program crash
PID:2164