Analysis
-
max time kernel
233s -
max time network
242s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 05:28
Behavioral task
behavioral1
Sample
release.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
release.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Release/Discord rat.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Release/Discord rat.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
builder.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
builder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
dnlib.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
dnlib.dll
Resource
win10v2004-20240426-en
General
-
Target
release.zip
-
Size
445KB
-
MD5
06a4fcd5eb3a39d7f50a0709de9900db
-
SHA1
50d089e915f69313a5187569cda4e6dec2d55ca7
-
SHA256
c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97
-
SHA512
75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b
-
SSDEEP
12288:BfJ13+GoLo2d5ifXHE8134QwYOwFSFRiLQI:BKGo8EifSQwYWI
Malware Config
Signatures
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 2 IoCs
pid Process 3272 NOTEPAD.EXE 3976 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1100 OpenWith.exe 2444 OpenWith.exe -
Suspicious use of SetWindowsHookEx 30 IoCs
pid Process 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 1100 OpenWith.exe 2444 OpenWith.exe 2444 OpenWith.exe 2444 OpenWith.exe 2444 OpenWith.exe 2444 OpenWith.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1100 wrote to memory of 3272 1100 OpenWith.exe 99 PID 1100 wrote to memory of 3272 1100 OpenWith.exe 99 PID 2444 wrote to memory of 3976 2444 OpenWith.exe 109 PID 2444 wrote to memory of 3976 2444 OpenWith.exe 109
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\release.zip1⤵PID:4064
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\UnregisterGrant.emz2⤵
- Opens file in notepad (likely ransom note)
PID:3272
-
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\5a50cfb2a4404114a5f85fd60513d142 /t 4052 /p 32721⤵PID:2596
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1432 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:1624
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\UnregisterGrant.emz2⤵
- Opens file in notepad (likely ransom note)
PID:3976
-