Analysis
-
max time kernel
37s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
23/01/2024, 08:24
Static task
static1
Behavioral task
behavioral1
Sample
w.sh
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
w.sh
Resource
win10v2004-20231222-en
7 signatures
150 seconds
General
-
Target
w.sh
-
Size
838B
-
MD5
39100bf4ac60acc5d1da4e79ae97f024
-
SHA1
a3d2ac5ed4d6306d8e9fc6b44eb35254bca206ef
-
SHA256
3c059b43edd2241ca0e29ed5aa17157ec82a8717463dbbd0e42e6a08abccc900
-
SHA512
9677c8c0cb6840e4cf32953a555d801b4810fa47145f4442bac8696a506adc37366a4b0da83cf49449d639c582667e8ac974b84cc5880cd9b2b8e6d79d5eaa8a
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1576 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4616 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1576 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe 4616 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4616 wrote to memory of 1576 4616 OpenWith.exe 99 PID 4616 wrote to memory of 1576 4616 OpenWith.exe 99
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\w.sh1⤵
- Modifies registry class
PID:4068
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\w.sh2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:1576
-