Overview
overview
10Static
static
1CompleteSe...on.rar
windows7-x64
3CompleteSe...on.rar
windows10-2004-x64
3Full_PassWord.txt
windows7-x64
1Full_PassWord.txt
windows10-2004-x64
1Newest_Set...ey.rar
windows7-x64
3Newest_Set...ey.rar
windows10-2004-x64
3LicenseKey.txt
windows7-x64
1LicenseKey.txt
windows10-2004-x64
1SetupFile.exe
windows7-x64
10SetupFile.exe
windows10-2004-x64
10Analysis
-
max time kernel
1590s -
max time network
1594s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
02-04-2023 17:19
Static task
static1
Behavioral task
behavioral1
Sample
CompleteSetup_Full_Version.rar
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
CompleteSetup_Full_Version.rar
Resource
win10v2004-20230220-es
Behavioral task
behavioral3
Sample
Full_PassWord.txt
Resource
win7-20230220-es
Behavioral task
behavioral4
Sample
Full_PassWord.txt
Resource
win10v2004-20230221-es
Behavioral task
behavioral5
Sample
Newest_Setup_2023_As_PassKey.rar
Resource
win7-20230220-es
Behavioral task
behavioral6
Sample
Newest_Setup_2023_As_PassKey.rar
Resource
win10v2004-20230220-es
Behavioral task
behavioral7
Sample
LicenseKey.txt
Resource
win7-20230220-es
Behavioral task
behavioral8
Sample
LicenseKey.txt
Resource
win10v2004-20230220-es
Behavioral task
behavioral9
Sample
SetupFile.exe
Resource
win7-20230220-es
Behavioral task
behavioral10
Sample
SetupFile.exe
Resource
win10v2004-20230220-es
General
-
Target
Newest_Setup_2023_As_PassKey.rar
-
Size
17.0MB
-
MD5
ea179d1c184f1e06ecdf6108d830e433
-
SHA1
b37571ad67cb43ccc1636405c79038c2bd1a4278
-
SHA256
00ff2c14c57fb9bfdf0a25f6c77195f3d8a61227388aca640586d00753a7acea
-
SHA512
3f376e5b54fcc465dad677012a40bbeb75096698cadeba4966bf0fcc94330c9aae3d14d235c536b83590d0d9fadf2f22a74e7c50b3694e88b9c1168489945fd0
-
SSDEEP
393216:tVPeIaw7r0sXdzF6ANGfx4NmD8xo4rKAf9d92aMkOJSfa8TfZ77M3:tVPe9w7r0str3Nc8WmZcaPODAfZ772
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 640 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1976 wrote to memory of 640 1976 cmd.exe 29 PID 1976 wrote to memory of 640 1976 cmd.exe 29 PID 1976 wrote to memory of 640 1976 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Newest_Setup_2023_As_PassKey.rar1⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Newest_Setup_2023_As_PassKey.rar2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:640
-