Overview
overview
3Static
static
1Greenshot.exe
windows7-x64
1Greenshot.exe
windows10-2004-x64
1Greenshot.exe.xml
windows7-x64
1Greenshot.exe.xml
windows10-2004-x64
1Greenshot.ini
windows7-x64
1Greenshot.ini
windows10-2004-x64
1GreenshotPlugin.dll
windows7-x64
1GreenshotPlugin.dll
windows10-2004-x64
1LinqBridge.dll
windows7-x64
1LinqBridge.dll
windows10-2004-x64
1Plugins/Gr...in.dll
windows7-x64
1Plugins/Gr...in.dll
windows10-2004-x64
1checksum.md5
windows7-x64
3checksum.md5
windows10-2004-x64
3log4net.dll
windows7-x64
1log4net.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12/03/2023, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
Greenshot.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Greenshot.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Greenshot.exe.xml
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Greenshot.exe.xml
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Greenshot.ini
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Greenshot.ini
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
GreenshotPlugin.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
GreenshotPlugin.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
LinqBridge.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
LinqBridge.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
Plugins/GreenshotImgurPlugin/GreenshotImgurPlugin.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
Plugins/GreenshotImgurPlugin/GreenshotImgurPlugin.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
checksum.md5
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
checksum.md5
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
log4net.dll
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
log4net.dll
Resource
win10v2004-20230220-en
General
-
Target
checksum.md5
-
Size
976B
-
MD5
3a358162338d119abacb04f793c9d6ea
-
SHA1
4632e350cb16b52a5004bdfea2634c29967d46bf
-
SHA256
68338580c8fa91a8ea188ec035c6a966419afdb748a7f84a8ead02910c9f932e
-
SHA512
69178433c3a6085a22a2f59fbf1de5b653aecc2a445f8cb7e86e400da737e3b8c6c853e4ae5096eebc6b80a9d34cf70471412c9cbd24f3ed22757a8de86c3d1c
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.md5 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\md5_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\md5_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\md5_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\md5_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\.md5\ = "md5_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\md5_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\md5_auto_file\shell\Read\command rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 780 AcroRd32.exe 780 AcroRd32.exe 780 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1676 wrote to memory of 1856 1676 cmd.exe 29 PID 1676 wrote to memory of 1856 1676 cmd.exe 29 PID 1676 wrote to memory of 1856 1676 cmd.exe 29 PID 1856 wrote to memory of 780 1856 rundll32.exe 30 PID 1856 wrote to memory of 780 1856 rundll32.exe 30 PID 1856 wrote to memory of 780 1856 rundll32.exe 30 PID 1856 wrote to memory of 780 1856 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\checksum.md51⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\checksum.md52⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\checksum.md5"3⤵
- Suspicious use of SetWindowsHookEx
PID:780
-
-