Analysis

  • max time kernel
    91s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2023, 02:38

General

  • Target

    Transmitted Service 7878459543.jpg

  • Size

    1.5MB

  • MD5

    db043ffcd9d17c324387a692a21a17f3

  • SHA1

    4845b5d0f0515793a541e0ea31b15974550c4956

  • SHA256

    0239ccdda382768b8c0305da5c99151a78280da8e200a177d857d2985f316611

  • SHA512

    bde7a26a44899c59ca312a9229e49c4914bffee36f5fa8bb1d79207ffbd77136097f1ff82d12e0286b63bf6f89605dd557fd1f2b5b6277a2ce8207812ae39577

  • SSDEEP

    24576:O/yEl7qrraXbGmog3unWWOCB3zds5f0zNz:O/FluraL26D6DS5fQNz

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 58 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Transmitted Service 7878459543.jpg"
    1⤵
      PID:4744
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p
      1⤵
      • Drops file in System32 directory
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:5012
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1328

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1328-135-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-136-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-137-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-141-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-143-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-142-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-144-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-145-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-146-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB

    • memory/1328-147-0x000001748BAF0000-0x000001748BAF1000-memory.dmp

      Filesize

      4KB