Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
Shadow_setup_file.rar
Resource
win7-20231023-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Shadow_setup_file.rar
Resource
win10v2004-20231023-en
6 signatures
150 seconds
General
-
Target
Shadow_setup_file.rar
-
Size
84.1MB
-
MD5
92367254ce1419170a56148502d52cf8
-
SHA1
791fdb52cb0c8d4cfe7d7a448424e3970c3bb341
-
SHA256
78b868e7183eadac76b5433abd8ba24dcaed723103f912a25af21530471c3a60
-
SHA512
74977b7de232a1e26e59736f0f36b4f8b0306e428539b3312e7e449bca6d4325fa277889a255e9bbd0e4694e0f636810e4e9842e82b2623551b37b76d7fff6d1
-
SSDEEP
1572864:2hiqIEQA6hL1uarcGPD83l27CoJ17Dd+3Xzb2Tnp8jbEbdc8/asjvo89KsMVQIg:2kqIVA6hNrB7GnonZ+3Xzgpwb8/asLVP
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\rar_auto_file\shell\open OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\rar_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\.rar OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\rar_auto_file OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\rar_auto_file\shell\edit\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\rar_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\.rar\ = "rar_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\rar_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\rar_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000_Classes\rar_auto_file\shell\open\command OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3096 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3436 OpenWith.exe -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3436 wrote to memory of 3096 3436 OpenWith.exe 109 PID 3436 wrote to memory of 3096 3436 OpenWith.exe 109
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Shadow_setup_file.rar1⤵
- Modifies registry class
PID:2748
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Shadow_setup_file.rar2⤵
- Opens file in notepad (likely ransom note)
PID:3096
-