Analysis

  • max time kernel
    140s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-03-2023 23:12

General

  • Target

    APT 37 Previous Commits 1/2022-03-22.rar

  • Size

    1.0MB

  • MD5

    f3f4cf7876817b1e8a2d49fe9bd7b206

  • SHA1

    bf3c443153c6f30ffce7cf66b49a4876df9ac35a

  • SHA256

    b0729b96dd478308be5562606abf20eadb0c59c0ea32315ab35a68d89aaae4d9

  • SHA512

    c6533901365302efe50172ddfa941c321ffff424bc2ab1d5caf79ec175374f5c59b0dbc46562291371e5c79709360749ea112d1febad86c1618b91f719b8ed5b

  • SSDEEP

    24576:QpLMCKGfym3g58XyTiZrV/gW7J3MHF5s4gHlyGnvk:ULtKG6m3g58XyWlV//dMkFG

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\APT 37 Previous Commits 1\2022-03-22.rar"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\APT 37 Previous Commits 1\2022-03-22.rar
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:376
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\APT 37 Previous Commits 1\2022-03-22.rar"
        3⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1332

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1332-83-0x000000013FC80000-0x000000013FD78000-memory.dmp
    Filesize

    992KB

  • memory/1332-84-0x000007FEF6F30000-0x000007FEF6F64000-memory.dmp
    Filesize

    208KB

  • memory/1332-85-0x000007FEF6500000-0x000007FEF67B4000-memory.dmp
    Filesize

    2.7MB

  • memory/1332-86-0x000007FEFB7E0000-0x000007FEFB7F8000-memory.dmp
    Filesize

    96KB

  • memory/1332-87-0x000007FEF6F10000-0x000007FEF6F27000-memory.dmp
    Filesize

    92KB

  • memory/1332-88-0x000007FEF6EF0000-0x000007FEF6F01000-memory.dmp
    Filesize

    68KB

  • memory/1332-89-0x000007FEF6950000-0x000007FEF6967000-memory.dmp
    Filesize

    92KB

  • memory/1332-90-0x000007FEF6930000-0x000007FEF6941000-memory.dmp
    Filesize

    68KB

  • memory/1332-92-0x000007FEF68F0000-0x000007FEF6901000-memory.dmp
    Filesize

    68KB

  • memory/1332-91-0x000007FEF6910000-0x000007FEF692D000-memory.dmp
    Filesize

    116KB

  • memory/1332-93-0x000007FEF6280000-0x000007FEF6480000-memory.dmp
    Filesize

    2.0MB

  • memory/1332-94-0x000007FEF64C0000-0x000007FEF64FF000-memory.dmp
    Filesize

    252KB

  • memory/1332-95-0x000007FEF51D0000-0x000007FEF627B000-memory.dmp
    Filesize

    16.7MB

  • memory/1332-96-0x000007FEF51A0000-0x000007FEF51C1000-memory.dmp
    Filesize

    132KB

  • memory/1332-97-0x000007FEF5180000-0x000007FEF5198000-memory.dmp
    Filesize

    96KB

  • memory/1332-98-0x000007FEF5160000-0x000007FEF5171000-memory.dmp
    Filesize

    68KB

  • memory/1332-99-0x000007FEF5140000-0x000007FEF5151000-memory.dmp
    Filesize

    68KB

  • memory/1332-100-0x000007FEF5100000-0x000007FEF5111000-memory.dmp
    Filesize

    68KB

  • memory/1332-101-0x000007FEF50E0000-0x000007FEF50FB000-memory.dmp
    Filesize

    108KB

  • memory/1332-102-0x000007FEF50C0000-0x000007FEF50D1000-memory.dmp
    Filesize

    68KB

  • memory/1332-103-0x000007FEF50A0000-0x000007FEF50B8000-memory.dmp
    Filesize

    96KB

  • memory/1332-104-0x000007FEF5070000-0x000007FEF50A0000-memory.dmp
    Filesize

    192KB

  • memory/1332-108-0x000007FEF4E40000-0x000007FEF4E96000-memory.dmp
    Filesize

    344KB

  • memory/1332-107-0x000007FEF4EA0000-0x000007FEF4EB1000-memory.dmp
    Filesize

    68KB

  • memory/1332-109-0x000007FEF4E10000-0x000007FEF4E38000-memory.dmp
    Filesize

    160KB

  • memory/1332-106-0x000007FEF4EC0000-0x000007FEF4F2F000-memory.dmp
    Filesize

    444KB

  • memory/1332-105-0x000007FEF5000000-0x000007FEF5067000-memory.dmp
    Filesize

    412KB

  • memory/1332-110-0x000007FEF4DE0000-0x000007FEF4E04000-memory.dmp
    Filesize

    144KB

  • memory/1332-116-0x000007FEF4D00000-0x000007FEF4D13000-memory.dmp
    Filesize

    76KB

  • memory/1332-117-0x000007FEF4CE0000-0x000007FEF4CF2000-memory.dmp
    Filesize

    72KB

  • memory/1332-118-0x000007FEF4BA0000-0x000007FEF4CDB000-memory.dmp
    Filesize

    1.2MB

  • memory/1332-115-0x000007FEF4D20000-0x000007FEF4D41000-memory.dmp
    Filesize

    132KB

  • memory/1332-119-0x000007FEF4B70000-0x000007FEF4B9C000-memory.dmp
    Filesize

    176KB

  • memory/1332-114-0x000007FEF4D50000-0x000007FEF4D62000-memory.dmp
    Filesize

    72KB

  • memory/1332-113-0x000007FEF4D70000-0x000007FEF4D81000-memory.dmp
    Filesize

    68KB

  • memory/1332-112-0x000007FEF4D90000-0x000007FEF4DB3000-memory.dmp
    Filesize

    140KB

  • memory/1332-111-0x000007FEF4DC0000-0x000007FEF4DD7000-memory.dmp
    Filesize

    92KB

  • memory/1332-120-0x000007FEF49B0000-0x000007FEF4B62000-memory.dmp
    Filesize

    1.7MB

  • memory/1332-122-0x000007FEF4890000-0x000007FEF48A1000-memory.dmp
    Filesize

    68KB

  • memory/1332-121-0x000007FEF4950000-0x000007FEF49AC000-memory.dmp
    Filesize

    368KB

  • memory/1332-124-0x000007FEF47D0000-0x000007FEF47E2000-memory.dmp
    Filesize

    72KB

  • memory/1332-123-0x000007FEF47F0000-0x000007FEF4887000-memory.dmp
    Filesize

    604KB

  • memory/1332-125-0x000007FEF4590000-0x000007FEF47C1000-memory.dmp
    Filesize

    2.2MB

  • memory/1332-126-0x000007FEF4400000-0x000007FEF4512000-memory.dmp
    Filesize

    1.1MB

  • memory/1332-127-0x000007FEF43C0000-0x000007FEF43F5000-memory.dmp
    Filesize

    212KB

  • memory/1332-128-0x000007FEF42B0000-0x000007FEF42D5000-memory.dmp
    Filesize

    148KB

  • memory/1332-129-0x000007FEF4290000-0x000007FEF42A1000-memory.dmp
    Filesize

    68KB

  • memory/1332-130-0x000007FEF4220000-0x000007FEF4281000-memory.dmp
    Filesize

    388KB

  • memory/1332-131-0x000007FEF4200000-0x000007FEF4211000-memory.dmp
    Filesize

    68KB

  • memory/1332-132-0x000007FEF41E0000-0x000007FEF41F2000-memory.dmp
    Filesize

    72KB

  • memory/1332-133-0x000007FEF41C0000-0x000007FEF41D3000-memory.dmp
    Filesize

    76KB

  • memory/1332-134-0x000007FEF4120000-0x000007FEF41BF000-memory.dmp
    Filesize

    636KB

  • memory/1332-135-0x000007FEF3D00000-0x000007FEF3D11000-memory.dmp
    Filesize

    68KB

  • memory/1332-136-0x000007FEF3B80000-0x000007FEF3C82000-memory.dmp
    Filesize

    1.0MB

  • memory/1332-137-0x000007FEF3B20000-0x000007FEF3B31000-memory.dmp
    Filesize

    68KB

  • memory/1332-138-0x000007FEF3B00000-0x000007FEF3B11000-memory.dmp
    Filesize

    68KB

  • memory/1332-142-0x000007FEF3A10000-0x000007FEF3A26000-memory.dmp
    Filesize

    88KB

  • memory/1332-144-0x000007FEF3800000-0x000007FEF3812000-memory.dmp
    Filesize

    72KB

  • memory/1332-146-0x000007FEF37C0000-0x000007FEF37D1000-memory.dmp
    Filesize

    68KB

  • memory/1332-145-0x000007FEF37E0000-0x000007FEF37F1000-memory.dmp
    Filesize

    68KB

  • memory/1332-143-0x000007FEF39E0000-0x000007FEF3A09000-memory.dmp
    Filesize

    164KB

  • memory/1332-141-0x000007FEF3AA0000-0x000007FEF3AB8000-memory.dmp
    Filesize

    96KB

  • memory/1332-140-0x000007FEF3AC0000-0x000007FEF3AD2000-memory.dmp
    Filesize

    72KB

  • memory/1332-139-0x000007FEF3AE0000-0x000007FEF3AF1000-memory.dmp
    Filesize

    68KB