Overview
overview
9Static
static
9ReasonLabs.rar
windows7-x64
3ReasonLabs.rar
windows10-2004-x64
3ReasonLabs...m.html
windows7-x64
1ReasonLabs...m.html
windows10-2004-x64
1ReasonLabs...47.dll
windows7-x64
3ReasonLabs...47.dll
windows10-2004-x64
1ReasonLabs...eg.dll
windows7-x64
1ReasonLabs...eg.dll
windows10-2004-x64
1ReasonLabs...GL.dll
windows7-x64
1ReasonLabs...GL.dll
windows10-2004-x64
1ReasonLabs...v2.dll
windows7-x64
1ReasonLabs...v2.dll
windows10-2004-x64
3ReasonLabs...app.js
windows7-x64
1ReasonLabs...app.js
windows10-2004-x64
1ReasonLabs...UI.exe
windows7-x64
1ReasonLabs...UI.exe
windows10-2004-x64
1ReasonLabs...er.dll
windows7-x64
3ReasonLabs...er.dll
windows10-2004-x64
3ReasonLabs...alllog
windows7-x64
3ReasonLabs...alllog
windows10-2004-x64
3ReasonLabs...lstate
windows7-x64
3ReasonLabs...lstate
windows10-2004-x64
3ReasonLabs...wf.cat
windows7-x64
8ReasonLabs...wf.cat
windows10-2004-x64
1ReasonLabs...wf.inf
windows7-x64
1ReasonLabs...wf.inf
windows10-2004-x64
1ReasonLabs...config
windows7-x64
3ReasonLabs...config
windows10-2004-x64
3ReasonLabs...p.asar
windows7-x64
3ReasonLabs...p.asar
windows10-2004-x64
3ReasonLabs...ar.sig
windows7-x64
3ReasonLabs...ar.sig
windows10-2004-x64
3Analysis
-
max time kernel
157s -
max time network
38s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2023 23:08
Behavioral task
behavioral1
Sample
ReasonLabs.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ReasonLabs.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
ReasonLabs/Common/Client/v1.0.7/LICENSES.chromium.html
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
ReasonLabs/Common/Client/v1.0.7/LICENSES.chromium.html
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
ReasonLabs/Common/Client/v1.0.7/d3dcompiler_47.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
ReasonLabs/Common/Client/v1.0.7/d3dcompiler_47.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
ReasonLabs/Common/Client/v1.0.7/ffmpeg.dll
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
ReasonLabs/Common/Client/v1.0.7/ffmpeg.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
ReasonLabs/Common/Client/v1.0.7/libEGL.dll
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
ReasonLabs/Common/Client/v1.0.7/libEGL.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
ReasonLabs/Common/Client/v1.0.7/libGLESv2.dll
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
ReasonLabs/Common/Client/v1.0.7/libGLESv2.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
ReasonLabs/Common/Client/v1.0.7/resources/app.js
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
ReasonLabs/Common/Client/v1.0.7/resources/app.js
Resource
win10v2004-20230221-en
Behavioral task
behavioral15
Sample
ReasonLabs/Common/Client/v1.0.7/rsAppUI.exe
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
ReasonLabs/Common/Client/v1.0.7/rsAppUI.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
ReasonLabs/Common/Client/v1.0.7/vk_swiftshader.dll
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
ReasonLabs/Common/Client/v1.0.7/vk_swiftshader.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
ReasonLabs/DNS/rsDNSSvc.installlog
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
ReasonLabs/DNS/rsDNSSvc.installlog
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
ReasonLabs/DNS/rsDNSSvc.installstate
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
ReasonLabs/DNS/rsDNSSvc.installstate
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
ReasonLabs/DNS/rsDwf.cat
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
ReasonLabs/DNS/rsDwf.cat
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
ReasonLabs/DNS/rsDwf.inf
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
ReasonLabs/DNS/rsDwf.inf
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
ReasonLabs/DNS/rsEngine.config
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
ReasonLabs/DNS/rsEngine.config
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
ReasonLabs/DNS/ui/app.asar
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
ReasonLabs/DNS/ui/app.asar
Resource
win10v2004-20230221-en
Behavioral task
behavioral31
Sample
ReasonLabs/DNS/ui/app.asar.sig
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
ReasonLabs/DNS/ui/app.asar.sig
Resource
win10v2004-20230220-en
General
-
Target
ReasonLabs/DNS/rsDNSSvc.installstate
-
Size
7KB
-
MD5
362ce475f5d1e84641bad999c16727a0
-
SHA1
6b613c73acb58d259c6379bd820cca6f785cc812
-
SHA256
1f78f1056761c6ebd8965ed2c06295bafa704b253aff56c492b93151ab642899
-
SHA512
7630e1629cf4abecd9d3ddea58227b232d5c775cb480967762a6a6466be872e1d57123b08a6179fe1cfbc09403117d0f81bc13724f259a1d25c1325f1eac645b
-
SSDEEP
96:R3DrP/zatgCnNjn1x62muDr9aHmzcv/65m7JDcm0BefnanGEkn56vT4ZvR++JDr+:NexdYX7OSRjXsaA0Ndhi
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 10 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\installstate_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\installstate_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\installstate_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.installstate rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\.installstate\ = "installstate_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\installstate_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\installstate_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000_CLASSES\installstate_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
AcroRd32.exepid process 2020 AcroRd32.exe 2020 AcroRd32.exe 2020 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 1352 wrote to memory of 928 1352 cmd.exe rundll32.exe PID 1352 wrote to memory of 928 1352 cmd.exe rundll32.exe PID 1352 wrote to memory of 928 1352 cmd.exe rundll32.exe PID 928 wrote to memory of 2020 928 rundll32.exe AcroRd32.exe PID 928 wrote to memory of 2020 928 rundll32.exe AcroRd32.exe PID 928 wrote to memory of 2020 928 rundll32.exe AcroRd32.exe PID 928 wrote to memory of 2020 928 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ReasonLabs\DNS\rsDNSSvc.installstate
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\ReasonLabs\DNS\rsDNSSvc.installstate
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\ReasonLabs\DNS\rsDNSSvc.installstate"
- Suspicious use of SetWindowsHookEx