Resubmissions
17-04-2023 16:19
230417-tsqjrsfb33 1017-04-2023 16:08
230417-tk6wsagg5s 1017-04-2023 15:53
230417-tbt6magg2s 1017-04-2023 15:30
230417-sxwqxage9v 10Analysis
-
max time kernel
139s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
17-04-2023 15:53
Static task
static1
Behavioral task
behavioral1
Sample
RFQ for supply of Stock Replenishment FI-2023-089.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
RFQ for supply of Stock Replenishment FI-2023-089.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
RFQ for supply of Stock Replenishment FI-2023-089.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
RFQ for supply of Stock Replenishment FI-2023-089.exe
Resource
win10v2004-20230220-en
General
-
Target
RFQ for supply of Stock Replenishment FI-2023-089.rar
-
Size
768KB
-
MD5
49f8a8d16bdd4d2af2be3a79d7b213a4
-
SHA1
1401ce8fc3f0d28d4ef74cc5e9942ceeb14478f9
-
SHA256
2408a41dc207fa367704b1f16372fedfa2c4163f65daf436d6f8ae2490b9aff6
-
SHA512
ffec50f37556a1e98695b8bd268d9f1f174431ed703894aae3dbc3cdaf79c2c5015c792f87e2175843601989085c869f540c01be1cc65a3ab593aa0d37cde748
-
SSDEEP
24576:ZBkU9NFUst/kzT0fW8yzFQP4Yq8BzNSDtiBRP9o4xTQFuHj:ZG8NftST0fWZzFQAYF0iBfo4QMD
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2008 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2008 vlc.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe 2008 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2008 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 588 1756 cmd.exe 29 PID 1756 wrote to memory of 588 1756 cmd.exe 29 PID 1756 wrote to memory of 588 1756 cmd.exe 29 PID 588 wrote to memory of 2008 588 rundll32.exe 30 PID 588 wrote to memory of 2008 588 rundll32.exe 30 PID 588 wrote to memory of 2008 588 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\RFQ for supply of Stock Replenishment FI-2023-089.rar"1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\RFQ for supply of Stock Replenishment FI-2023-089.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\RFQ for supply of Stock Replenishment FI-2023-089.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2008
-
-