Analysis
-
max time kernel
91s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
13/03/2023, 23:44
Static task
static1
Behavioral task
behavioral1
Sample
CodWW2.torrent
Resource
win7-20230220-es
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
CodWW2.torrent
Resource
win10v2004-20230220-es
3 signatures
150 seconds
General
-
Target
CodWW2.torrent
-
Size
149KB
-
MD5
be7e85c7234203a215431a1f990f5f09
-
SHA1
2d71184bdfdf87688fea39c4a55eee24fbeae03d
-
SHA256
1d6f9f3ab35d0184cd6446eab20a6f0b82af5490ffe5db9905f4cc252a9480d1
-
SHA512
88ec055dfd3efccbae20e572ad2dc6f2367b804ac4983715c4bdb71dc9d08f701c9d4695e183dd0bc61a6f9a0996537224a9a1faef0feefd61c230c63ed3e860
-
SSDEEP
3072:mBwZXnpfQQDbxdLl3G93dmErZNrT4rCKjmhBwEYe:mQQoXLl34TMCKSjwY
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1588 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1588 1680 cmd.exe 29 PID 1680 wrote to memory of 1588 1680 cmd.exe 29 PID 1680 wrote to memory of 1588 1680 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\CodWW2.torrent1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\CodWW2.torrent2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1588
-