Resubmissions
15-05-2024 11:58
240515-n495nagc6y 1015-05-2024 11:54
240515-n3d1tsgd33 415-05-2024 09:22
240515-lb8p1sba32 10Analysis
-
max time kernel
235s -
max time network
264s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-05-2024 11:58
Static task
static1
General
-
Target
4423890.rar
-
Size
11.2MB
-
MD5
ff7553a8d62ba75491119628aa7ede6e
-
SHA1
105b16f65c61570fd9c6ff2077597ba626026cda
-
SHA256
58fb41c622cfccae8febc06e0c04f25bdb613a5b260ae6f404e9d0eda5ea86ab
-
SHA512
ee01b5273fa7fb49eb8f55b995174bb869ebe77854427c4691e8980f5c2b49eef66a9e3fc8ecb6dd2388f390423318653b3573d1002af3124c70a42ed5815c22
-
SSDEEP
196608:f9VizBum/MJuS5PuZBv5z7/AGUnfbhI7epRSv6EjBGu0wcDGIuPJGopuS5R:X4BF/GuS5PuZLQGOfeavSNjgu0tiI1o/
Malware Config
Signatures
-
DarkTrack payload 4 IoCs
resource yara_rule behavioral1/memory/1892-701-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/1892-704-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/1892-703-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack behavioral1/memory/1892-702-0x0000000000400000-0x00000000004A8000-memory.dmp family_darktrack -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rupedoras.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rupedoras.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rupedoras.exe -
Executes dropped EXE 2 IoCs
pid Process 4024 Predstavlenie № 6-51-2024 .docx.exe 4160 rupedoras.exe -
resource yara_rule behavioral1/files/0x000900000001ac08-142.dat themida behavioral1/memory/4160-191-0x0000000000400000-0x0000000001F60000-memory.dmp themida behavioral1/memory/4160-192-0x0000000000400000-0x0000000001F60000-memory.dmp themida behavioral1/memory/4160-707-0x0000000000400000-0x0000000001F60000-memory.dmp themida -
resource yara_rule behavioral1/memory/1892-698-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1892-701-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1892-704-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1892-703-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1892-702-0x0000000000400000-0x00000000004A8000-memory.dmp upx behavioral1/memory/1892-700-0x0000000000400000-0x00000000004A8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\KWn3 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\rupedoras.exe" Predstavlenie № 6-51-2024 .docx.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rupedoras.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4160 rupedoras.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4160 set thread context of 1892 4160 rupedoras.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings Predstavlenie № 6-51-2024 .docx.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3328 NOTEPAD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4984 WINWORD.EXE 4984 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4160 rupedoras.exe 4160 rupedoras.exe 4160 rupedoras.exe 4160 rupedoras.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1892 AddInProcess32.exe 4432 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2352 7zFM.exe Token: 35 2352 7zFM.exe Token: SeSecurityPrivilege 2352 7zFM.exe Token: SeDebugPrivilege 4160 rupedoras.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2352 7zFM.exe 2352 7zFM.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 5112 OpenWith.exe 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4984 WINWORD.EXE 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe 4432 OpenWith.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4984 4024 Predstavlenie № 6-51-2024 .docx.exe 84 PID 4024 wrote to memory of 4984 4024 Predstavlenie № 6-51-2024 .docx.exe 84 PID 4024 wrote to memory of 4160 4024 Predstavlenie № 6-51-2024 .docx.exe 86 PID 4024 wrote to memory of 4160 4024 Predstavlenie № 6-51-2024 .docx.exe 86 PID 4024 wrote to memory of 4160 4024 Predstavlenie № 6-51-2024 .docx.exe 86 PID 4160 wrote to memory of 1892 4160 rupedoras.exe 89 PID 4160 wrote to memory of 1892 4160 rupedoras.exe 89 PID 4160 wrote to memory of 1892 4160 rupedoras.exe 89 PID 4160 wrote to memory of 1892 4160 rupedoras.exe 89 PID 4160 wrote to memory of 1892 4160 rupedoras.exe 89 PID 4160 wrote to memory of 1892 4160 rupedoras.exe 89 PID 4160 wrote to memory of 1892 4160 rupedoras.exe 89 PID 4432 wrote to memory of 3328 4432 OpenWith.exe 93 PID 4432 wrote to memory of 3328 4432 OpenWith.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\4423890.rar1⤵
- Modifies registry class
PID:212
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5112
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1476
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\4423890.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2352
-
C:\Users\Admin\Desktop\Predstavlenie № 6-51-2024 .docx.exe"C:\Users\Admin\Desktop\Predstavlenie № 6-51-2024 .docx.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\zapros.docx" /o ""2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\rupedoras.exeC:\Users\Admin\AppData\Local\Temp\rupedoras.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1892
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Klog.dat2⤵
- Opens file in notepad (likely ransom note)
PID:3328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
578B
MD5aea50de80ee06f58ca7269d995643107
SHA18831309e7dabf84406619ce6329d758bbef0b751
SHA256e03fff1947e32a2206de556197b51f0ca0798c2023b0e742e25320abd5ee8f8e
SHA512c6815dd334043ec8c762ad50b85a458d651c952f70aa8231c96e16c079484c69faa96338d84d5c743d8f522b5479678b56db48810fa6c0c052f8d40dc2f70f20
-
Filesize
11.2MB
MD5d483c1a9718cf5d880b3cce5d6ff7423
SHA172be5e949dd6923a43e7eaab1811baea4bc4b644
SHA2568df595a1528a09fdcfe237a7dd1009d1380a886875747d1b145925968463f7bd
SHA512370e220b3bdb617a12479db075ee26741075306ce7a72237115b2d79c452baadf931ccf3b422e9d0ef1eb0138316c3233f3ecd27074f3e797dc20ee974eb6fe4
-
Filesize
11KB
MD59871272af8b06b484f0529c10350a910
SHA1707979b027f371989fb71e36795b652a2d466592
SHA256c2a256547433bec8d7afbed923f453eb2df978f18ed498e82bb2b244b126a9f3
SHA5125bd60de706ed3ef717177b08fa69ebc8117fe52bf53e896b91d102430b4b976b136f2df75fe4d1cb9cf16f5e73052e030e364bdf212148b1471e9c2b99f76a4c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Bibliography Styles\TM02851218[[fn=gb]].xsl
Filesize262KB
MD551d32ee5bc7ab811041f799652d26e04
SHA1412193006aa3ef19e0a57e16acf86b830993024a
SHA2566230814bf5b2d554397580613e20681752240ab87fd354ececf188c1eabe0e97
SHA5125fc5d889b0c8e5ef464b76f0c4c9e61bda59b2d1205ac9417cc74d6e9f989fb73d78b4eb3044a1a1e1f2c00ce1ca1bd6d4d07eeadc4108c7b124867711c31810
-
Filesize
11.3MB
MD545ae0c08a1fb98fe77e4cd127b79ef7d
SHA112c7847fc2567ee9e6c0010f5c311753c017fa48
SHA256bb8165b8f60818061d12cac775d8d41436b16c9b40e01071fca7fb96f6ef435e
SHA51221cc13630fc1fe3bea4d45e356e63d4e94db7357040793b4d091ef75b2cf05191037380c493b944d1ecf748b9bd9935f1f91ba0c8654c57dbbe4530ab4fff4cd