Analysis
-
max time kernel
137s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-es -
resource tags
arch:x64arch:x86image:win10v2004-20230220-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
13-03-2023 23:42
Static task
static1
Behavioral task
behavioral1
Sample
CodWW2.torrent
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
CodWW2.torrent
Resource
win10v2004-20230220-es
General
-
Target
CodWW2.torrent
-
Size
149KB
-
MD5
be7e85c7234203a215431a1f990f5f09
-
SHA1
2d71184bdfdf87688fea39c4a55eee24fbeae03d
-
SHA256
1d6f9f3ab35d0184cd6446eab20a6f0b82af5490ffe5db9905f4cc252a9480d1
-
SHA512
88ec055dfd3efccbae20e572ad2dc6f2367b804ac4983715c4bdb71dc9d08f701c9d4695e183dd0bc61a6f9a0996537224a9a1faef0feefd61c230c63ed3e860
-
SSDEEP
3072:mBwZXnpfQQDbxdLl3G93dmErZNrT4rCKjmhBwEYe:mQQoXLl34TMCKSjwY
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2275444769-3691835758-4097679484-1000\{9A899E3C-B021-4264-9A9E-6F0389E5BE80} svchost.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe 4716 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CodWW2.torrent1⤵
- Modifies registry class
PID:2412
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:2768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c