Overview
overview
3Static
static
3SESmartIDC...tion.h
windows7-x64
3SESmartIDC...tion.h
windows10-2004-x64
3SESmartIDC...defs.h
windows7-x64
3SESmartIDC...defs.h
windows10-2004-x64
3SESmartIDC...etry.h
windows7-x64
3SESmartIDC...etry.h
windows10-2004-x64
3SESmartIDC...mage.h
windows7-x64
3SESmartIDC...mage.h
windows10-2004-x64
3SESmartIDC...etry.h
windows7-x64
3SESmartIDC...etry.h
windows10-2004-x64
3SESmartIDC...oly.js
windows7-x64
1SESmartIDC...oly.js
windows10-2004-x64
1SESmartIDC...uad.js
windows7-x64
1SESmartIDC...uad.js
windows10-2004-x64
1Analysis
-
max time kernel
9s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20/05/2023, 14:44
Behavioral task
behavioral1
Sample
SESmartIDCore/include/secommon/se_exception.h
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
SESmartIDCore/include/secommon/se_exception.h
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
SESmartIDCore/include/secommon/se_export_defs.h
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
SESmartIDCore/include/secommon/se_export_defs.h
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
SESmartIDCore/include/secommon/se_geometry.h
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
SESmartIDCore/include/secommon/se_geometry.h
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
SESmartIDCore/include/secommon/se_image.h
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
SESmartIDCore/include/secommon/se_image.h
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
SESmartIDCore/wrap/objcsecommon/include/objcsecommon/se_geometry.h
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
SESmartIDCore/wrap/objcsecommon/include/objcsecommon/se_geometry.h
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
SESmartIDCore/wrap/objcsecommon/src/se_geometry/poly.js
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
SESmartIDCore/wrap/objcsecommon/src/se_geometry/poly.js
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
SESmartIDCore/wrap/objcsecommon/src/se_geometry/quad.js
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
SESmartIDCore/wrap/objcsecommon/src/se_geometry/quad.js
Resource
win10v2004-20230220-en
General
-
Target
SESmartIDCore/wrap/objcsecommon/include/objcsecommon/se_geometry.h
-
Size
4KB
-
MD5
84e2ea56be483883710e6135d7f8af8a
-
SHA1
439ac40826ec5339908e8d3f8964346ad4cb4fc1
-
SHA256
2d20c4e4dc49e2377b4cec76f6ab75ee4f68b49c4e84bd8accd4bab445228850
-
SHA512
5d51a092667fe0a73eee0e59988412f65daec02e95ccb0ec7ae2ac1bc331f46a96c669fd8ba29519ea0deb6acf9d15941931b424586d411462c5d7ee21fd0e4a
-
SSDEEP
96:UOHk9RyTjv0S2/FjjY76TMNn23q2AqxbuNa7vU0+HZOpO32:UPMN23Sqx0fOpO32
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.h\ = "h_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file\shell\edit rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file\shell\edit\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file\shell\open rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file\shell\open\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\.h rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000_CLASSES\h_auto_file\shell rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 480 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 912 wrote to memory of 268 912 cmd.exe 29 PID 912 wrote to memory of 268 912 cmd.exe 29 PID 912 wrote to memory of 268 912 cmd.exe 29 PID 268 wrote to memory of 480 268 rundll32.exe 30 PID 268 wrote to memory of 480 268 rundll32.exe 30 PID 268 wrote to memory of 480 268 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\SESmartIDCore\wrap\objcsecommon\include\objcsecommon\se_geometry.h1⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\SESmartIDCore\wrap\objcsecommon\include\objcsecommon\se_geometry.h2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\SESmartIDCore\wrap\objcsecommon\include\objcsecommon\se_geometry.h3⤵
- Opens file in notepad (likely ransom note)
PID:480
-
-