Analysis

  • max time kernel
    543s
  • max time network
    547s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    05/03/2023, 12:44

General

  • Target

    Setup_FullVersion_Use_2023_PassWord.rar

  • Size

    24.5MB

  • MD5

    2497f8d5ec904ae205428176f4b19de0

  • SHA1

    27e2894ca1d027e329b695c6c5e481b418f011e7

  • SHA256

    5fd016520c8a88c1a96f2d862853de69feb3457a16ec17668310c981379784b8

  • SHA512

    6b785a6449cc56c1847f7c5411ce1243021b628bf83da8f4625a661323410a2d5fe9579ccf2c00a537df587f69d9bd88951bf4dfac63a3a7393c9340251116eb

  • SSDEEP

    393216:VNhLYbqraLzfTfWs/Ahc82DTMMSgpdLUDVgPg6sP+QpfNJZq8W/CFpr:VDYff5ohaD4M8Vj2QpfTZq8VFR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Setup_FullVersion_Use_2023_PassWord.rar
    1⤵
    • Modifies registry class
    PID:4864
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4848
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4636
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Setup_FullVersion_Use_2023_PassWord\" -spe -an -ai#7zMap20767:128:7zEvent25706
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3712
    • C:\Users\Admin\Desktop\Setup_FullVersion_Use_2023_PassWord\Setup.exe
      "C:\Users\Admin\Desktop\Setup_FullVersion_Use_2023_PassWord\Setup.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:3672

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\Setup_FullVersion_Use_2023_PassWord\Setup.exe

      Filesize

      734.4MB

      MD5

      c3fdb9c33a0204b5a5308e9fffb3808b

      SHA1

      fbb825cb7d83e9d690dc240488692cbb33777ce6

      SHA256

      33bad098375365aeb97069e447a3947c385480c89f7d5ba1692c14dfc826cd49

      SHA512

      0bd6b736a9aaeaa10336cd59196a123ffa7dfefaf3502863e47cd001d8650541b9df0f3653621ec362df0d5d41a4231aa073559e0079d8a362e35055cb784ec1

    • C:\Users\Admin\Desktop\Setup_FullVersion_Use_2023_PassWord\Setup.exe

      Filesize

      734.4MB

      MD5

      c3fdb9c33a0204b5a5308e9fffb3808b

      SHA1

      fbb825cb7d83e9d690dc240488692cbb33777ce6

      SHA256

      33bad098375365aeb97069e447a3947c385480c89f7d5ba1692c14dfc826cd49

      SHA512

      0bd6b736a9aaeaa10336cd59196a123ffa7dfefaf3502863e47cd001d8650541b9df0f3653621ec362df0d5d41a4231aa073559e0079d8a362e35055cb784ec1

    • memory/3672-263-0x0000000001D30000-0x0000000001D31000-memory.dmp

      Filesize

      4KB

    • memory/3672-264-0x0000000001D40000-0x0000000001D41000-memory.dmp

      Filesize

      4KB

    • memory/3672-265-0x0000000000400000-0x0000000001D1B000-memory.dmp

      Filesize

      25.1MB