Resubmissions
23-11-2023 20:34
231123-zcl5ascb62 323-11-2023 20:33
231123-zbzc8sda7v 123-11-2023 20:32
231123-za94cada6w 323-11-2023 05:23
231123-f3hp1sgb65 323-11-2023 05:19
231123-fztm4sha3z 323-11-2023 05:16
231123-fyhjfsgb59 323-11-2023 05:11
231123-fvey6aha3t 323-11-2023 05:05
231123-fq2mcsgb43 8Analysis
-
max time kernel
34s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2023 05:05
Static task
static1
Behavioral task
behavioral1
Sample
57C8EDB95DF3F0AD4EE2DC2B8CFD4157.cab
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
57C8EDB95DF3F0AD4EE2DC2B8CFD4157.cab
Resource
win10v2004-20231025-en
Behavioral task
behavioral3
Sample
disallowedcert.stl
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
disallowedcert.stl
Resource
win10v2004-20231020-en
General
-
Target
disallowedcert.stl
-
Size
5KB
-
MD5
78785956ab4e54d6116d673c3491edff
-
SHA1
962277a5497c60c77ba5de1caf7606d976e4299d
-
SHA256
c514dbdbb13632cbb378c59086c1ebb0bc9b25ffb0a349f2b052b065c0d913e6
-
SHA512
854eba4c9597692f38fc65acf6510bb4894873383b873a34a8b9e46fdec427aa6562b8592fb279431decdbb507e8ed605b78b1483052d9cd4196fa3cf1542cc1
-
SSDEEP
96:7nxsSPd1si1Y50uP/D+DExy9YDcvJFS9Vxk1qe79tDD0BDEdf6PYjISm2gry7fjn:7G2LV00GDTH63Req6vSDf8hUP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 992 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
OpenWith.exepid process 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe 1400 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
OpenWith.exedescription pid process target process PID 1400 wrote to memory of 992 1400 OpenWith.exe NOTEPAD.EXE PID 1400 wrote to memory of 992 1400 OpenWith.exe NOTEPAD.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\disallowedcert.stl1⤵
- Modifies registry class
PID:2988
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\disallowedcert.stl2⤵
- Opens file in notepad (likely ransom note)
PID:992
-