Resubmissions
17-04-2023 16:19
230417-tsqjrsfb33 1017-04-2023 16:08
230417-tk6wsagg5s 1017-04-2023 15:53
230417-tbt6magg2s 1017-04-2023 15:30
230417-sxwqxage9v 10Analysis
-
max time kernel
140s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-04-2023 15:30
Static task
static1
Behavioral task
behavioral1
Sample
RFQ for supply of Stock Replenishment FI-2023-089.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ for supply of Stock Replenishment FI-2023-089.rar
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
RFQ for supply of Stock Replenishment FI-2023-089.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
RFQ for supply of Stock Replenishment FI-2023-089.exe
Resource
win10v2004-20230220-en
General
-
Target
RFQ for supply of Stock Replenishment FI-2023-089.rar
-
Size
768KB
-
MD5
49f8a8d16bdd4d2af2be3a79d7b213a4
-
SHA1
1401ce8fc3f0d28d4ef74cc5e9942ceeb14478f9
-
SHA256
2408a41dc207fa367704b1f16372fedfa2c4163f65daf436d6f8ae2490b9aff6
-
SHA512
ffec50f37556a1e98695b8bd268d9f1f174431ed703894aae3dbc3cdaf79c2c5015c792f87e2175843601989085c869f540c01be1cc65a3ab593aa0d37cde748
-
SSDEEP
24576:ZBkU9NFUst/kzT0fW8yzFQP4Yq8BzNSDtiBRP9o4xTQFuHj:ZG8NftST0fWZzFQAYF0iBfo4QMD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1308 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1308 vlc.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe 1308 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1308 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1864 1384 cmd.exe 29 PID 1384 wrote to memory of 1864 1384 cmd.exe 29 PID 1384 wrote to memory of 1864 1384 cmd.exe 29 PID 1864 wrote to memory of 1308 1864 rundll32.exe 30 PID 1864 wrote to memory of 1308 1864 rundll32.exe 30 PID 1864 wrote to memory of 1308 1864 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RFQ for supply of Stock Replenishment FI-2023-089.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RFQ for supply of Stock Replenishment FI-2023-089.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\RFQ for supply of Stock Replenishment FI-2023-089.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1308
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD5209b899b644247c57cc07153ea4eb246
SHA1acacc24c0bd9118db8a8e37a48a290d3a26153fc
SHA25600dda17490976d977890ff4b118f2d8e632e3c79aa2b07b889351aabd5365e7f
SHA5125952ee398cf0992740464fe822ee84c83931594ea2edcb10df58345dca2c6e4d3f8d6f3757380dfcecff04340f80580b547c682ed5013c79d733019cc5c2e7b4