Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
12/03/2023, 05:06
Static task
static1
Behavioral task
behavioral1
Sample
SGS, AUTODUCK by DH KIDZM.rar
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
SGS, AUTODUCK by DH KIDZM.rar
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
Subscribe to Opkiller gaming/READ ME !!!.txt
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
Subscribe to Opkiller gaming/READ ME !!!.txt
Resource
win10v2004-20230220-es
Behavioral task
behavioral5
Sample
Subscribe to Opkiller gaming/demoplayer.dll
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
Subscribe to Opkiller gaming/demoplayer.dll
Resource
win10v2004-20230220-es
General
-
Target
SGS, AUTODUCK by DH KIDZM.rar
-
Size
11KB
-
MD5
7e950806c42087980043003e7b5dd19c
-
SHA1
ca067be7efc4c466e87d6f9c085e7219b173aad7
-
SHA256
f50fc02ad4913a96f50006e307c05bbf05a709dbd311a063631b571cd9b60102
-
SHA512
6d5303653aa4384458285feb0daa8df34bf5fe138dfe30aff7b14656a2a66fbe4a90a8139a57661974bcfc561305b0149afe2e6c1bb8f9dafb9dfadffd9ca3e3
-
SSDEEP
192:Re6YhsdjxhLIQ77wO8faPJSk6O1YulABMdpDl3diWKZ2NQ22MSQ+Dzp4B:ReYFB7mfO8Mdb3dxKZ2NQ2vOF4B
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 684 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 712 wrote to memory of 684 712 cmd.exe 29 PID 712 wrote to memory of 684 712 cmd.exe 29 PID 712 wrote to memory of 684 712 cmd.exe 29 PID 684 wrote to memory of 520 684 rundll32.exe 30 PID 684 wrote to memory of 520 684 rundll32.exe 30 PID 684 wrote to memory of 520 684 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\SGS, AUTODUCK by DH KIDZM.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SGS, AUTODUCK by DH KIDZM.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\SGS, AUTODUCK by DH KIDZM.rar3⤵PID:520
-
-