Analysis
-
max time kernel
46s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02-04-2023 16:42
Static task
static1
Behavioral task
behavioral1
Sample
Crystalware b10 PREMIUM.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Crystalware b10 PREMIUM.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Crystalware b10/Crystalware b10.jar
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Crystalware b10/Crystalware b10.jar
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
Crystalware b10/Crystalware b10.json
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
Crystalware b10/Crystalware b10.json
Resource
win10v2004-20230220-en
General
-
Target
Crystalware b10/Crystalware b10.json
-
Size
3KB
-
MD5
2766098a8becc96aded98229d4c71599
-
SHA1
3a5c52a28e5fd84bf00a3fc1da37940d1631fa6d
-
SHA256
56440582d3ca9c00e04a7f4bff731a10556653906f9f210a0a963a9c67302a64
-
SHA512
a171b97d5c519c16cd9d436ec52aaa33e4e6d080504f6fda3d83de5edd1ee3c300127615305a85be0d9a60331f3cd60bcd6ec630991df8ee6aa16d82f565cc34
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.json rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1692 AcroRd32.exe 1692 AcroRd32.exe 1692 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1208 2040 cmd.exe 29 PID 2040 wrote to memory of 1208 2040 cmd.exe 29 PID 2040 wrote to memory of 1208 2040 cmd.exe 29 PID 1208 wrote to memory of 1692 1208 rundll32.exe 30 PID 1208 wrote to memory of 1692 1208 rundll32.exe 30 PID 1208 wrote to memory of 1692 1208 rundll32.exe 30 PID 1208 wrote to memory of 1692 1208 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Crystalware b10\Crystalware b10.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Crystalware b10\Crystalware b10.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Crystalware b10\Crystalware b10.json"3⤵
- Suspicious use of SetWindowsHookEx
PID:1692
-
-