Analysis

  • max time kernel
    92s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/05/2023, 21:03

General

  • Target

    nothing.bin

  • Size

    1023.0MB

  • MD5

    5a91ed4f5bb8aacd274b46fe6fc77334

  • SHA1

    d8d22885c08f43930cf896ddc8001af5ac457f86

  • SHA256

    97471669a066d46555228f3532f232211a27290d0078bd8eb47a5855bdc0ae9c

  • SHA512

    837ac8ac6b20e0179bee8872870761f4ed64d28b355d38016b5688d8c5c207573e7e1bdbfd4e002452606fb183fb2c3af075f4ccf03e1956f6464c13a2d1abd8

  • SSDEEP

    3::

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\nothing.bin
    1⤵
    • Modifies registry class
    PID:1220
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\nothing.bin
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2088
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4884

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nothing.bin

      Filesize

      819.7MB

      MD5

      2bba6238f64c4de7dc5316a944d397c4

      SHA1

      c1add509ce3e52555a62fd0cba03dfbc44d3a383

      SHA256

      5fef3d9acde3b39f05a3b76fc826e76be397e4a3a65e85fbf3f2503f61634ab7

      SHA512

      74e7b2f91c3af1112ba42ac724d2752f3a047db00c3015777c4b0a13bffe59af748bf1f376e7f2c62d216192991515a70acb475dd24ec978bc1d25ee28f05bb9