Resubmissions
26-02-2024 17:10
240226-vpvjzsbh8x 1026-02-2024 17:07
240226-vm4pwabh5v 1019-02-2024 16:49
240219-vbqnwage7y 10Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-02-2024 17:07
Static task
static1
Behavioral task
behavioral1
Sample
240219-tf7brafh73_pw_infected.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
240219-tf7brafh73_pw_infected.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Ransomware.WannaCry.zip
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Ransomware.WannaCry.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win10v2004-20240221-en
General
-
Target
240219-tf7brafh73_pw_infected.zip
-
Size
3.3MB
-
MD5
a48e102a737c9c3506a98d766e466195
-
SHA1
13ce0d69d73a537e7745e47706aab5508f231dde
-
SHA256
07277482c7598874910acd36595298a91c63ac15986d4caf3b10c85833101336
-
SHA512
05e57c4d94f45c8c99910e5b802bb20758137bfb8a15b9b18a58f173847b90818b919c6c4c5a9ba7cd6a6991773cd2ce01ba454e56b09f19898ab64435bb6066
-
SSDEEP
49152:i+c0LBMP9X1iWaaVKd0jbkQy1uycb+xyIN+2kH+IRHVoAicMRD9zJthV:nBMlg/kKuf4BcbwyMIR1oLhzfhV
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
taskmgr.exepid process 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 924 taskmgr.exe Token: SeSystemProfilePrivilege 924 taskmgr.exe Token: SeCreateGlobalPrivilege 924 taskmgr.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
taskmgr.exepid process 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
taskmgr.exepid process 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe 924 taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\240219-tf7brafh73_pw_infected.zip1⤵PID:1104
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:924