Analysis

  • max time kernel
    34s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2023, 14:54

General

  • Target

    include/idengine/id_face_result.h

  • Size

    5KB

  • MD5

    3701a5b147df914a0ffcac02de032518

  • SHA1

    8419d5c9098828c631afc029d4404df8fa5aea9e

  • SHA256

    b0a5128d6854091cce2f99c515a995d49c179b053300e475c69fad97144ccdf2

  • SHA512

    0bfc5abe253f381c08a13391d50be8b5c92cf8421be98f45e704c4e5f3f2406904831e06c8548029977caf89c6bf5819e063d956f1d533b2dd006cc21aabf828

  • SSDEEP

    96:UOy0rP4WPPZyH2SwUjmSTlpD7Q/inObbf263wxlOMznfizjtyjnGvqzKGgN:UZi4WPPA2SwOm6DkLT3NUZtKG2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 13 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\include\idengine\id_face_result.h
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\include\idengine\id_face_result.h
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\include\idengine\id_face_result.h
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads