Overview
overview
10Static
static
8APT 37 Pre....rar
windows7-x64
3APT 37 Pre....rar
windows10-2004-x64
3KN0408_045....chm
windows7-x64
1KN0408_045....chm
windows10-2004-x64
1KN0408_045...호.js
windows7-x64
1KN0408_045...호.js
windows10-2004-x64
1APT 37 Pre....rar
windows7-x64
3APT 37 Pre....rar
windows10-2004-x64
3LG유플....chm
windows7-x64
1LG유플....chm
windows10-2004-x64
1LG유플....html
windows7-x64
1LG유플....html
windows10-2004-x64
1APT 37 Pre....rar
windows7-x64
3APT 37 Pre....rar
windows10-2004-x64
3APT 37 Pre...02.rar
windows7-x64
3APT 37 Pre...02.rar
windows10-2004-x64
3APT 37 Pre...1).rar
windows7-x64
3APT 37 Pre...1).rar
windows10-2004-x64
3APT 37 Pre...ge.rar
windows7-x64
3APT 37 Pre...ge.rar
windows10-2004-x64
3APT 37 Pre....doc
windows7-x64
10APT 37 Pre....doc
windows10-2004-x64
10APT 37 Pre...1).rar
windows7-x64
3APT 37 Pre...1).rar
windows10-2004-x64
3APT 37 Pre...2).rar
windows7-x64
3APT 37 Pre...2).rar
windows10-2004-x64
3APT 37 Pre...ce.rar
windows7-x64
3APT 37 Pre...ce.rar
windows10-2004-x64
3APT 37 Pre...1).rar
windows7-x64
3APT 37 Pre...1).rar
windows10-2004-x64
3APT 37 Pre...ne.rar
windows7-x64
3APT 37 Pre...ne.rar
windows10-2004-x64
3Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 23:28
Behavioral task
behavioral1
Sample
APT 37 Previous Commits 3/KN0408_045 정영호.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
APT 37 Previous Commits 3/KN0408_045 정영호.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
KN0408_045 정영호/KN0408_045 정영호.chm
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
KN0408_045 정영호/KN0408_045 정영호.chm
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
KN0408_045 정영호/KN0408_045 정영호.js
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
KN0408_045 정영호/KN0408_045 정영호.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
APT 37 Previous Commits 3/LG유플러스_이동통신_202207_이_선.rar
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
APT 37 Previous Commits 3/LG유플러스_이동통신_202207_이_선.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
LG유플러스_이동통신_202207_이_선.chm
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
LG유플러스_이동통신_202207_이_선.chm
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
LG유플러스_이동통신_202207_이_선.html
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
LG유플러스_이동통신_202207_이_선.html
Resource
win10v2004-20230221-en
Behavioral task
behavioral13
Sample
APT 37 Previous Commits 3/LG유플러스_이동통신_202208_이_선.rar
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
APT 37 Previous Commits 3/LG유플러스_이동통신_202208_이_선.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
APT 37 Previous Commits 3/MAIL_20230125151802.rar
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
APT 37 Previous Commits 3/MAIL_20230125151802.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
APT 37 Previous Commits 3/Message (1).rar
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
APT 37 Previous Commits 3/Message (1).rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
APT 37 Previous Commits 3/Message.rar
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
APT 37 Previous Commits 3/Message.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
APT 37 Previous Commits 3/NEW(주)엠에스북스 사업자등록증.doc
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
APT 37 Previous Commits 3/NEW(주)엠에스북스 사업자등록증.doc
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
APT 37 Previous Commits 3/NTS_eTaxInvoice (1).rar
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
APT 37 Previous Commits 3/NTS_eTaxInvoice (1).rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
APT 37 Previous Commits 3/NTS_eTaxInvoice (2).rar
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
APT 37 Previous Commits 3/NTS_eTaxInvoice (2).rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
APT 37 Previous Commits 3/NTS_eTaxInvoice.rar
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
APT 37 Previous Commits 3/NTS_eTaxInvoice.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
APT 37 Previous Commits 3/News about Foreign affairs, The High North and Ukraine (1).rar
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
APT 37 Previous Commits 3/News about Foreign affairs, The High North and Ukraine (1).rar
Resource
win10v2004-20230221-en
Behavioral task
behavioral31
Sample
APT 37 Previous Commits 3/News about Foreign affairs, The High North and Ukraine.rar
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
APT 37 Previous Commits 3/News about Foreign affairs, The High North and Ukraine.rar
Resource
win10v2004-20230220-en
General
-
Target
APT 37 Previous Commits 3/MAIL_20230125151802.rar
-
Size
3KB
-
MD5
0c2375825dcae816a1f9b53f8f82d705
-
SHA1
b44732c9fc0d70138cc9cd99b70aa43265888d8d
-
SHA256
3c0b996e37dd3a2c6a457891065e09d47cd1fc25a91f2001ac8813de0a5e55f9
-
SHA512
9d92d04dab7b7329559a3ac8c44decb21afdf46aa72b417ba796f4e80c1b03d0e540a7862d330b1b1ece4ba6d543fe003def867f3a92f91b9d23b116f66afd25
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 2064 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\APT 37 Previous Commits 3\MAIL_20230125151802.rar"1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx