Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2024 00:32

General

  • Target

    CashRansomware.exe

  • Size

    2.6MB

  • MD5

    71f0e2645d9051c3a8f5cf2dbce9d074

  • SHA1

    a303632965f9fdc3b7cb4c532831c0b38f24df90

  • SHA256

    132ef1a933f9d26fb0bb46b0a970dbfe05ad8fe0859ece8eb973b5584a580cc3

  • SHA512

    14625c8fe238a41c0a45579731a15a705f153681a0f4e212b8315e3f5643542c57e17f82c247552b21417aa92dce36fd40fbcaaf85b4fb462182c2814f4f8077

  • SSDEEP

    49152:Til/s9YkCKuT/s9YEQtQRTMYIMi7ztf33cSywWyFoEgn9u:OVsGkClzsG1tQRjdih8rwc

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CashRansomware.exe
    "C:\Users\Admin\AppData\Local\Temp\CashRansomware.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Suspicious use of AdjustPrivilegeToken
    PID:2460
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\RegisterRestore.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    • Suspicious use of FindShellTrayWindow
    PID:688
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\RestartDebug.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3924
  • C:\Program Files\VideoLAN\VLC\vlc.exe
    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\GroupHide.M2V"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:4792
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\ImportRequest.shtml
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4872
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb19f546f8,0x7ffb19f54708,0x7ffb19f54718
      2⤵
        PID:1748
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,11741168258897261112,14587651416393208930,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:2
        2⤵
          PID:4676
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,11741168258897261112,14587651416393208930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2724
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,11741168258897261112,14587651416393208930,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:8
          2⤵
            PID:1004
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11741168258897261112,14587651416393208930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
            2⤵
              PID:4072
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,11741168258897261112,14587651416393208930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
              2⤵
                PID:3284
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:1552
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2184

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                  Filesize

                  471B

                  MD5

                  fb5985075b9eb1c32ef1b44daaf233a1

                  SHA1

                  5cbf8e64bec7b3191fd85bf72e645e87fca60ea0

                  SHA256

                  f25bf9959497b9ee550f15d5e056bab14d85798ae906afbfefefc9fb3616f4fb

                  SHA512

                  dca3f1936047c2fd473b1a4c723439e6e3e76364dd64acb3954aed63f1a093000dbc4bbca61b499ebb3b74abe396187b26f87847963ae0b86d75004a9c9752a8

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                  Filesize

                  412B

                  MD5

                  07d40cc8e7d7e466a43920b314e1255d

                  SHA1

                  b9d72ff2239fd1511e17ff21cc4d23663f3e5c0d

                  SHA256

                  a8ce2238f30099f452d7d4db67beb24b6deeaedbd7555a1800bac84e5dadadce

                  SHA512

                  9978239f3b8d0b167bbeb6bdb1c747d7604c9d4dea74cf5355d8af9d6997d72389088953c0046ce37a1c0cf0d2ae863996b01046bf47cd8ac805eb12c644c5b5

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  ea98e583ad99df195d29aa066204ab56

                  SHA1

                  f89398664af0179641aa0138b337097b617cb2db

                  SHA256

                  a7abb51435909fa2d75c6f2ff5c69a93d4a0ab276ed579e7d8733b2a63ffbee6

                  SHA512

                  e109be3466e653e5d310b3e402e1626298b09205d223722a82344dd78504f3c33e1e24e8402a02f38cd2c9c50d96a303ce4846bea5a583423937ab018cd5782f

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                  Filesize

                  152B

                  MD5

                  4f7152bc5a1a715ef481e37d1c791959

                  SHA1

                  c8a1ed674c62ae4f45519f90a8cc5a81eff3a6d7

                  SHA256

                  704dd4f98d8ca34ec421f23ba1891b178c23c14b3301e4655efc5c02d356c2bc

                  SHA512

                  2e6b02ca35d76a655a17a5f3e9dbd8d7517c7dae24f0095c7350eb9e7bdf9e1256a7009aa8878f96c89d1ea4fe5323a41f72b8c551806dda62880d7ff231ff5c

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  257190b370b8988611a2d44d87b306f4

                  SHA1

                  a98be44dd0d8295f7fede0b2f3ff3d1fb767815c

                  SHA256

                  769d9c676a7759c2bb964a59a772925cfba908b225775e2e2453e8bfc061f932

                  SHA512

                  4cf16095382a8f3a2dd617f2f8075a657acf92193cff2e1d19ede24cea605c2b3657b9d2e386e446cb91c578658c3857d1b4d98b48683a32fc99f02e8642e8ad

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                  Filesize

                  6KB

                  MD5

                  bca16dfb95e6d67998c34237067bbcb8

                  SHA1

                  3f9a5d9eab1839a0bfcfafef737d6f5a4e668873

                  SHA256

                  c26034efd19865ae4b752b1bc653f2d37db4db960f114de160c4e1a5d0d74455

                  SHA512

                  168846330a49f568c233aeb3cba6beb53acfc18bfb3a67ff8345417332641bca654b68da55ec326eb5e319b29d05aa6b7d1d0794b480370dcdb6c55791ed55ac

                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                  Filesize

                  11KB

                  MD5

                  012feb97e0f93fa6a14eb6f2afa0821b

                  SHA1

                  ae1fb7ac4e41f5bd04b46a8d951e94c405fd767f

                  SHA256

                  3f8c31aa9f81791e49fc37e701985803d24cad117d8f0a78597d53c4ebf72315

                  SHA512

                  ed35dab12f1562e4996ab9ef9ad3e45d4e034f86cd2fe7cbbde7a8c8eb7f49e4c4176393f167301b797c026eadd03c9489aa14792f98cc0a1bd97a217ba10b95

                • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres

                  Filesize

                  2KB

                  MD5

                  fbe0a3d52f09ce1990361b9b7524fe1b

                  SHA1

                  b57e399c87b47375a2fdb59cbf1795f57ed067a9

                  SHA256

                  2b19f3e2276fb08170c195ef641670dab4b04c2ea00c5e57f5a5e8e35c7e883b

                  SHA512

                  8126fd17b079e93fd57d4720b3ea4fb4ccb029cc82ba7987215e9e77f277ea163183f493acdc92bff3861cb231bef4dd64e1aea84a62a7325de8afe4180e9308

                • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

                  Filesize

                  2KB

                  MD5

                  a948dd05023cce023dbdf5820cd06bc1

                  SHA1

                  9ee54a843c60f62eeebd744400699e24c1e96d1e

                  SHA256

                  1be9cbcedfd166ba725b7c71a122768a531dcd337d41a60b36d7c10235ea17ad

                  SHA512

                  8cbb53b32d323c247c63039ba69175106c732fa204d3112ca412e10733cd3c226b197cb2e1d473abb153d31117d05bfcb6098419a842ee9eb0e03a2d1dc547ab

                • C:\Users\Admin\AppData\Local\Temp\TCDA2F6.tmp\iso690.xsl

                  Filesize

                  263KB

                  MD5

                  ff0e07eff1333cdf9fc2523d323dd654

                  SHA1

                  77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

                  SHA256

                  3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

                  SHA512

                  b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

                • memory/2460-9-0x0000017B78D90000-0x0000017B78F39000-memory.dmp

                  Filesize

                  1.7MB

                • memory/2460-0-0x00007FFB22493000-0x00007FFB22495000-memory.dmp

                  Filesize

                  8KB

                • memory/2460-8-0x00007FFB22490000-0x00007FFB22F51000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2460-2-0x00007FFB22490000-0x00007FFB22F51000-memory.dmp

                  Filesize

                  10.8MB

                • memory/2460-1-0x0000017B5DDE0000-0x0000017B5E07A000-memory.dmp

                  Filesize

                  2.6MB

                • memory/3924-16-0x00007FFAFE180000-0x00007FFAFE190000-memory.dmp

                  Filesize

                  64KB

                • memory/3924-15-0x00007FFAFE180000-0x00007FFAFE190000-memory.dmp

                  Filesize

                  64KB

                • memory/3924-14-0x00007FFB00890000-0x00007FFB008A0000-memory.dmp

                  Filesize

                  64KB

                • memory/3924-13-0x00007FFB00890000-0x00007FFB008A0000-memory.dmp

                  Filesize

                  64KB

                • memory/3924-11-0x00007FFB00890000-0x00007FFB008A0000-memory.dmp

                  Filesize

                  64KB

                • memory/3924-12-0x00007FFB00890000-0x00007FFB008A0000-memory.dmp

                  Filesize

                  64KB

                • memory/3924-10-0x00007FFB00890000-0x00007FFB008A0000-memory.dmp

                  Filesize

                  64KB

                • memory/4792-606-0x00007FFB39A20000-0x00007FFB39A37000-memory.dmp

                  Filesize

                  92KB

                • memory/4792-612-0x00007FFB1CA60000-0x00007FFB1CC6B000-memory.dmp

                  Filesize

                  2.0MB

                • memory/4792-613-0x00007FFB235C0000-0x00007FFB23601000-memory.dmp

                  Filesize

                  260KB

                • memory/4792-611-0x00007FFB39980000-0x00007FFB39991000-memory.dmp

                  Filesize

                  68KB

                • memory/4792-610-0x00007FFB399A0000-0x00007FFB399BD000-memory.dmp

                  Filesize

                  116KB

                • memory/4792-609-0x00007FFB399C0000-0x00007FFB399D1000-memory.dmp

                  Filesize

                  68KB

                • memory/4792-608-0x00007FFB399E0000-0x00007FFB399F7000-memory.dmp

                  Filesize

                  92KB

                • memory/4792-607-0x00007FFB39A00000-0x00007FFB39A11000-memory.dmp

                  Filesize

                  68KB

                • memory/4792-602-0x00007FF7EE250000-0x00007FF7EE348000-memory.dmp

                  Filesize

                  992KB

                • memory/4792-604-0x00007FFB1D190000-0x00007FFB1D446000-memory.dmp

                  Filesize

                  2.7MB

                • memory/4792-605-0x00007FFB39A40000-0x00007FFB39A58000-memory.dmp

                  Filesize

                  96KB

                • memory/4792-603-0x00007FFB2B470000-0x00007FFB2B4A4000-memory.dmp

                  Filesize

                  208KB

                • memory/4792-623-0x00007FFB1D130000-0x00007FFB1D18C000-memory.dmp

                  Filesize

                  368KB

                • memory/4792-622-0x00000119BF890000-0x00000119BF8A3000-memory.dmp

                  Filesize

                  76KB

                • memory/4792-621-0x00000119BF860000-0x00000119BF881000-memory.dmp

                  Filesize

                  132KB

                • memory/4792-620-0x00000119BEA90000-0x00000119BEAA2000-memory.dmp

                  Filesize

                  72KB

                • memory/4792-619-0x00007FFB31920000-0x00007FFB31931000-memory.dmp

                  Filesize

                  68KB

                • memory/4792-618-0x00007FFB31AA0000-0x00007FFB31AB1000-memory.dmp

                  Filesize

                  68KB

                • memory/4792-617-0x00007FFB31E10000-0x00007FFB31E21000-memory.dmp

                  Filesize

                  68KB

                • memory/4792-616-0x00007FFB38080000-0x00007FFB38098000-memory.dmp

                  Filesize

                  96KB

                • memory/4792-615-0x00007FFB39950000-0x00007FFB39971000-memory.dmp

                  Filesize

                  132KB

                • memory/4792-614-0x00007FFB0E4E0000-0x00007FFB0F590000-memory.dmp

                  Filesize

                  16.7MB