Analysis
-
max time kernel
68s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/03/2023, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
Exitlag.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Exitlag.rar
Resource
win10v2004-20230220-en
General
-
Target
Exitlag.rar
-
Size
15.7MB
-
MD5
db5af2c6be52fdfc95ec6cfa28faa002
-
SHA1
3a875cf8b4f30a7e22cece899c21489e96bf785e
-
SHA256
37d6498e6575f42269d44c588a41f1457d5169f98e68b26b44712cfecfe27ccc
-
SHA512
5f92d62aefb7935ef48c79e8cc1f9c371174d6a59a4814c1f746c22f1f08d5673bca263e1244adad87d37c26186c5e80e3c05b1e8e2820d74faf655f1e30e540
-
SSDEEP
393216:nI0MfL/sZhjYMpGxxTLEyF7vCoWqi89/rFFtxKbw:nI43jGjTL3F7K8r9zFbxKc
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1072 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1072 vlc.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe 1072 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1072 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 316 wrote to memory of 528 316 cmd.exe 29 PID 316 wrote to memory of 528 316 cmd.exe 29 PID 316 wrote to memory of 528 316 cmd.exe 29 PID 528 wrote to memory of 1072 528 rundll32.exe 30 PID 528 wrote to memory of 1072 528 rundll32.exe 30 PID 528 wrote to memory of 1072 528 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Exitlag.rar1⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Exitlag.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Exitlag.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1072
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5478a4a09f4f74e97335cd4d5e9da7ab5
SHA13c4f1dc52a293f079095d0b0370428ec8e8f9315
SHA256884b59950669842f3c45e6da3480cd9a553538b951fb155b435b48ff38683974
SHA512e96719663cd264132a8e1ea8c3f8a148c778a0c68caa2468ba47629393605b197dd9e00efad91f389de9fcc77b04981a0cf87f785f3c645cdc9e4ebd98060ca1