Analysis
-
max time kernel
74s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05-04-2023 17:32
Static task
static1
Behavioral task
behavioral1
Sample
Actives_Setup_2023_As_PassKey.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Actives_Setup_2023_As_PassKey.rar
Resource
win10v2004-20230221-en
General
-
Target
Actives_Setup_2023_As_PassKey.rar
-
Size
12.4MB
-
MD5
61040d324af567376629c49a5e1dddf2
-
SHA1
c2b4e2907bab7584cb48d161fdf3ce119ece92c3
-
SHA256
901c4fc8c8a5cd7de5536f98e97df4eb84bb328c32dab62dbb01a566d6d776c6
-
SHA512
2374e6c2f5ea3e4a8a0196fb159b12f9552a53f2cb56edef6e50189416f7663d2ac7d405ac94efbbd514d3d5913717b3ec5830cc22811bd6154e57bff0643b7b
-
SSDEEP
196608:8ez+JcHqUMpAtZAoggGKoAyt7N95hCbdk34gtqXVyUEvJF4uT/4//cpCAiJhr3D6:JgtSaKoHNLhn4gV1THUO1iJd3DwbUlk
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 684 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Actives_Setup_2023_As_PassKey.rar1⤵
- Modifies registry class
PID:2736
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:684