Analysis
-
max time kernel
92s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16/05/2023, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
nothing.bin
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
nothing.bin
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
nothing.bin
Resource
win10v2004-20230220-en
General
-
Target
nothing.bin
-
Size
1023.0MB
-
MD5
5a91ed4f5bb8aacd274b46fe6fc77334
-
SHA1
d8d22885c08f43930cf896ddc8001af5ac457f86
-
SHA256
97471669a066d46555228f3532f232211a27290d0078bd8eb47a5855bdc0ae9c
-
SHA512
837ac8ac6b20e0179bee8872870761f4ed64d28b355d38016b5688d8c5c207573e7e1bdbfd4e002452606fb183fb2c3af075f4ccf03e1956f6464c13a2d1abd8
-
SSDEEP
3::
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2088 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe 1780 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2088 1780 OpenWith.exe 68 PID 1780 wrote to memory of 2088 1780 OpenWith.exe 68
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\nothing.bin1⤵
- Modifies registry class
PID:1220
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\nothing.bin2⤵
- Opens file in notepad (likely ransom note)
PID:2088
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
819.7MB
MD52bba6238f64c4de7dc5316a944d397c4
SHA1c1add509ce3e52555a62fd0cba03dfbc44d3a383
SHA2565fef3d9acde3b39f05a3b76fc826e76be397e4a3a65e85fbf3f2503f61634ab7
SHA51274e7b2f91c3af1112ba42ac724d2752f3a047db00c3015777c4b0a13bffe59af748bf1f376e7f2c62d216192991515a70acb475dd24ec978bc1d25ee28f05bb9