Resubmissions

21-10-2023 12:33

231021-pq6ezsef6y 10

12-10-2023 09:49

231012-ltsrhsbf4v 10

Analysis

  • max time kernel
    41s
  • max time network
    24s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21-10-2023 12:33

General

  • Target

    rockyou.txt

  • Size

    133.4MB

  • MD5

    9076652d8ae75ce713e23ab09e10d9ee

  • SHA1

    768abc17bafbce37bf3cf1e946f6d9970428b7b3

  • SHA256

    6dfa76aa0e02303994fd1062d0ac983f0b69ece5474d85a5bba36362e19c1076

  • SHA512

    6359fe9a1fee8b593072489d9c6a54fc4df05bbe268a8c68e4ca97a222dc3d3173b2440417360ad205f8358466c85a1b1db75bd1ae284232117cbb7edb8e7acd

  • SSDEEP

    49152:DKEU1WInu2BU/wYi/DvQy09mRSZL+Hkw58q6DDArE1O3ONHDdODyWgDLiK7F4NTc:3jttW3dnsaPtCCH/DXXKhADplIv

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 40 IoCs
  • Suspicious use of SendNotifyMessage 38 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE C:\Users\Admin\AppData\Local\Temp\rockyou.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    • Suspicious use of FindShellTrayWindow
    PID:3208
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads