Analysis
-
max time kernel
29s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
28/03/2023, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
TheForest_v1.11.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TheForest_v1.11.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Magyar (Hungarian).json
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Magyar (Hungarian).json
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
Olvass el.txt
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Olvass el.txt
Resource
win10v2004-20230220-en
General
-
Target
Magyar (Hungarian).json
-
Size
103KB
-
MD5
bf762064d5531e951c0c989178d27437
-
SHA1
a9d8da76158d458ad4e70982d1b6e697918b9648
-
SHA256
3db63f2a775d391af23fb9b9b67970708bc22108803762df2c8df605e059519e
-
SHA512
893938e2243d05387ee24e42f49d9704f205ffef75a1948c5d490b640b1f104948d529b61669bc2c5bf1c8751c3d93097fdce5aa02172076e3b2eead3897e05c
-
SSDEEP
1536:v+ISIzy0SBhQtLvTQ2nE1pi0H8J+Kwwg9x95jF60p/XC5:/SwSBS9Q2Ix95hFa5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_CLASSES\json_auto_file\shell\edit\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1176 1100 cmd.exe 28 PID 1100 wrote to memory of 1176 1100 cmd.exe 28 PID 1100 wrote to memory of 1176 1100 cmd.exe 28 PID 1176 wrote to memory of 1156 1176 rundll32.exe 29 PID 1176 wrote to memory of 1156 1176 rundll32.exe 29 PID 1176 wrote to memory of 1156 1176 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Magyar (Hungarian).json"1⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Magyar (Hungarian).json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Magyar (Hungarian).json3⤵PID:1156
-
-