Analysis
-
max time kernel
41s -
max time network
24s -
platform
windows10-1703_x64 -
resource
win10-20231020-en -
resource tags
arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system -
submitted
21-10-2023 12:33
Behavioral task
behavioral1
Sample
rockyou.txt
Resource
win10-20231020-en
windows10-1703-x64
7 signatures
1800 seconds
General
-
Target
rockyou.txt
-
Size
133.4MB
-
MD5
9076652d8ae75ce713e23ab09e10d9ee
-
SHA1
768abc17bafbce37bf3cf1e946f6d9970428b7b3
-
SHA256
6dfa76aa0e02303994fd1062d0ac983f0b69ece5474d85a5bba36362e19c1076
-
SHA512
6359fe9a1fee8b593072489d9c6a54fc4df05bbe268a8c68e4ca97a222dc3d3173b2440417360ad205f8358466c85a1b1db75bd1ae284232117cbb7edb8e7acd
-
SSDEEP
49152:DKEU1WInu2BU/wYi/DvQy09mRSZL+Hkw58q6DDArE1O3ONHDdODyWgDLiK7F4NTc:3jttW3dnsaPtCCH/DXXKhADplIv
Score
4/10
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\810424605.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\3877292338.pri taskmgr.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3208 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
taskmgr.exepid process 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 3344 taskmgr.exe Token: SeSystemProfilePrivilege 3344 taskmgr.exe Token: SeCreateGlobalPrivilege 3344 taskmgr.exe -
Suspicious use of FindShellTrayWindow 40 IoCs
Processes:
taskmgr.exeNOTEPAD.EXEpid process 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3208 NOTEPAD.EXE 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
Processes:
taskmgr.exepid process 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe 3344 taskmgr.exe
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\rockyou.txt1⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:3208
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3344