Analysis
-
max time kernel
54s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
03/03/2023, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
0.22.0.zip
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
0.22.0.zip
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
__MACOSX/._VirtualXposed_0.22.0.apk
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
__MACOSX/._VirtualXposed_0.22.0.apk
Resource
win10v2004-20230220-es
Behavioral task
behavioral5
Sample
__MACOSX/._VirtualXposed_for_GameGuardian_0.22.apk
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
__MACOSX/._VirtualXposed_for_GameGuardian_0.22.apk
Resource
win10v2004-20230220-es
General
-
Target
__MACOSX/._VirtualXposed_0.22.0.apk
-
Size
175B
-
MD5
06d40dc20774465e0c3836b7f64b22fb
-
SHA1
bae3df36fef42ad0a7ceab6c9c8cedafd16a2d0c
-
SHA256
4346105e5a89bcbd92084e98fa4593c6e20048855542dfcab71609b254d28f2d
-
SHA512
3a6f45449e1832edbfd0c445a20252c4ac3b679b2fd4f562d960bb7c97189c2c52f47dc900f47d4d06ce9b94a31d8d7c76dd108d79e6d3d5f41d1ce1ffca537f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1596 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\__MACOSX\._VirtualXposed_0.22.0.apk1⤵
- Modifies registry class
PID:4160
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1596