Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2023, 05:58
Behavioral task
behavioral1
Sample
102da27ddfd7be4857466a0fc8dfaf70.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
102da27ddfd7be4857466a0fc8dfaf70.exe
Resource
win10v2004-20230703-en
General
-
Target
102da27ddfd7be4857466a0fc8dfaf70.exe
-
Size
3.2MB
-
MD5
102da27ddfd7be4857466a0fc8dfaf70
-
SHA1
31731d76ee1e4c5c9a9832aa867412b3424084ae
-
SHA256
35b7a1d790ed7c6257041e1fd4ff8c8e57620a4615f706e539b437388f37683c
-
SHA512
a9e17870bd2e87fd328cc028aace97f506a52840b961ca4c2d52c7ac2f3f4788be1c5ad5da728ca8e3177196338f4ea2d234e37b50d0261559ada0d26ee9767a
-
SSDEEP
98304:b5d+Xz6lAyJCnTu4obf/XBOHlIG2zEW5Vs+h0:FdeWCNnTuRbfMF10U+G
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/644-133-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/644-137-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/644-141-0x0000000000400000-0x000000000047B000-memory.dmp upx behavioral2/memory/644-142-0x0000000000400000-0x000000000047B000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\ssunstl.exe 102da27ddfd7be4857466a0fc8dfaf70.exe File opened for modification C:\Windows\Reve1.scr 102da27ddfd7be4857466a0fc8dfaf70.exe File created C:\Windows\Reve1.scr 102da27ddfd7be4857466a0fc8dfaf70.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\Reve1.scr" 102da27ddfd7be4857466a0fc8dfaf70.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\Desktop\ScreenSaveActive = "1" 102da27ddfd7be4857466a0fc8dfaf70.exe Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\Desktop 102da27ddfd7be4857466a0fc8dfaf70.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings 102da27ddfd7be4857466a0fc8dfaf70.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1104 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 644 wrote to memory of 1104 644 102da27ddfd7be4857466a0fc8dfaf70.exe 87 PID 644 wrote to memory of 1104 644 102da27ddfd7be4857466a0fc8dfaf70.exe 87 PID 644 wrote to memory of 1104 644 102da27ddfd7be4857466a0fc8dfaf70.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\102da27ddfd7be4857466a0fc8dfaf70.exe"C:\Users\Admin\AppData\Local\Temp\102da27ddfd7be4857466a0fc8dfaf70.exe"1⤵
- Drops file in Windows directory
- Modifies Control Panel
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67B
MD5f42d6791f54709f9060de215e08bd09a
SHA18560253b7610552be045a28d813115f200d4ac10
SHA2567485e527a86371b4306cbab58ae07b8e554f4082569594983e1bea1f4cff7f8a
SHA51237201005fffcb8c33f625af9b939d3fff09aa99b19d3337a050f0ebd0d01f90f97cb234de7b554a020790988f6b67ae4344be836304f510cad4ac5c093c5e910