Analysis

  • max time kernel
    1094s
  • max time network
    1121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2023 05:12

General

  • Target

    1d81c09d8249410587ae.zipaj

  • Size

    276B

  • MD5

    0981763686ccbaeb328f9bf85101200e

  • SHA1

    b0a27789929af7db6bc3da5e7ae7571e39b7fd76

  • SHA256

    cfa87f6afd5ccff85a0220a4509b26150a0b6f0538c8ffc1623a9b9a4feb2684

  • SHA512

    2655fce811abf8417a79e325bfd3f7dd022aa3a05610342f623a048cb132fc4ca5f15cb64cdfa5501b13da98c105f55e6a4b4e212af55e5e9efc4d68f9e178dc

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\1d81c09d8249410587ae.zipaj
    1⤵
    • Modifies registry class
    PID:4248
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\1d81c09d8249410587ae.zipaj
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2444
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 412 -p 316 -ip 316
    1⤵
      PID:2988
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 316 -s 2348
      1⤵
      • Program crash
      PID:2408

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads