Resubmissions
29-07-2024 17:10
240729-vpz5gazeqp 129-07-2024 17:09
240729-vpcdeathqh 114-06-2024 04:49
240614-ff6tbszbpj 129-03-2024 06:22
240329-g4ycjabe4t 129-03-2024 06:17
240329-g16vhabd8v 105-02-2024 17:04
240205-vlb88seefk 125-01-2024 15:42
240125-s5e35ahhf6 325-01-2024 15:41
240125-s4smtsaghm 1023-12-2023 03:09
231223-dnx52sgfa6 1022-12-2023 01:18
231222-bn5h1sbfel 10Analysis
-
max time kernel
968s -
max time network
973s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2023 23:23
Behavioral task
behavioral1
Sample
Universocraft_by__JuPo_2022.yml1.txt
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Universocraft_by__JuPo_2022.yml1.txt
Resource
win10v2004-20230621-en
General
-
Target
Universocraft_by__JuPo_2022.yml1.txt
-
Size
41.8MB
-
MD5
2fada81ace28689122dc2da8858012f8
-
SHA1
56141bf7cff07a2365de8c35f6cbff920fc8419d
-
SHA256
5bceebc1d2b6899ca9b532e00eda646aec85221ac82d77392476f4cfc1d714cd
-
SHA512
45fe19b69cbfbda326849c91733e25d9c989e4927530142df79be00394e75059a1987530ec9237dd421c092e606da3816da3066fdd9b0a53dfccef88e19c8437
-
SSDEEP
49152:nSMCSyZLZMLF3fesg0TNIAtpzxjz4oJi1h10f7KANvl4oJgGi1h4c+oZhCCD5cXI:d712B5C+IVz08gO10eWZiuz
Malware Config
Signatures
-
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{7EF4C4B2-D617-41AC-B0EB-C8A289063696}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{120D7ABB-C21B-455A-8DF6-6881E8B66D59}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{6825FC2B-98FA-49DE-B8C0-DA2300841854}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0788C862-85A6-47EA-9122-77847A71030B}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{AAEDAB72-08BB-498A-AA56-1333BD79AC1F}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{0129D226-7E62-49F1-806D-C5F9E5B8C6B9}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{703E12A1-1230-4D2A-A6FF-E2975A2B55D6}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{96DFDD85-1C0F-4AF9-B297-CF3EEE4F0C90}.catalogItem svchost.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3068 NOTEPAD.EXE
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\Universocraft_by__JuPo_2022.yml1.txt1⤵
- Opens file in notepad (likely ransom note)
PID:3068
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
PID:2076