Overview
overview
10Static
static
10Desty.zip
windows11-21h2-x64
1CefSharp.B...re.dll
windows11-21h2-x64
3CefSharp.B...ss.exe
windows11-21h2-x64
1CefSharp.C...me.dll
windows11-21h2-x64
3CefSharp.Core.dll
windows11-21h2-x64
1CefSharp.Wpf.dll
windows11-21h2-x64
1CefSharp.dll
windows11-21h2-x64
1Client.exe
windows11-21h2-x64
10DestyApi.json
windows11-21h2-x64
3DestyInstaller.exe
windows11-21h2-x64
7Creal.pyc
windows11-21h2-x64
3Readme.txt
windows11-21h2-x64
3Updater.exe
windows11-21h2-x64
chrome_100...nt.pak
windows11-21h2-x64
3chrome_200...nt.pak
windows11-21h2-x64
3chrome_elf.dll
windows11-21h2-x64
1d3dcompiler_47.dll
windows11-21h2-x64
3debug.log
windows11-21h2-x64
3icudtl.dat
windows11-21h2-x64
3libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows11-21h2-x64
1libcef.dll
windows11-21h2-x64
1resources.pak
windows11-21h2-x64
3v8_context...ot.bin
windows11-21h2-x64
3vk_swiftshader.dll
windows11-21h2-x64
3Analysis
-
max time kernel
1797s -
max time network
1804s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-07-2024 15:40
Behavioral task
behavioral1
Sample
Desty.zip
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
CefSharp.BrowserSubprocess.Core.dll
Resource
win11-20240709-en
Behavioral task
behavioral3
Sample
CefSharp.BrowserSubprocess.exe
Resource
win11-20240709-en
Behavioral task
behavioral4
Sample
CefSharp.Core.Runtime.dll
Resource
win11-20240709-en
Behavioral task
behavioral5
Sample
CefSharp.Core.dll
Resource
win11-20240709-en
Behavioral task
behavioral6
Sample
CefSharp.Wpf.dll
Resource
win11-20240709-en
Behavioral task
behavioral7
Sample
CefSharp.dll
Resource
win11-20240709-en
Behavioral task
behavioral8
Sample
Client.exe
Resource
win11-20240709-en
Behavioral task
behavioral9
Sample
DestyApi.json
Resource
win11-20240709-en
Behavioral task
behavioral10
Sample
DestyInstaller.exe
Resource
win11-20240709-en
Behavioral task
behavioral11
Sample
Creal.pyc
Resource
win11-20240709-en
Behavioral task
behavioral12
Sample
Readme.txt
Resource
win11-20240709-en
Behavioral task
behavioral13
Sample
Updater.exe
Resource
win11-20240709-en
Behavioral task
behavioral14
Sample
chrome_100_percent.pak
Resource
win11-20240709-en
Behavioral task
behavioral15
Sample
chrome_200_percent.pak
Resource
win11-20240709-en
Behavioral task
behavioral16
Sample
chrome_elf.dll
Resource
win11-20240709-en
Behavioral task
behavioral17
Sample
d3dcompiler_47.dll
Resource
win11-20240709-en
Behavioral task
behavioral18
Sample
debug.log
Resource
win11-20240709-en
Behavioral task
behavioral19
Sample
icudtl.dat
Resource
win11-20240709-en
Behavioral task
behavioral20
Sample
libEGL.dll
Resource
win11-20240709-en
Behavioral task
behavioral21
Sample
libGLESv2.dll
Resource
win11-20240709-en
Behavioral task
behavioral22
Sample
libcef.dll
Resource
win11-20240709-en
Behavioral task
behavioral23
Sample
resources.pak
Resource
win11-20240709-en
Behavioral task
behavioral24
Sample
v8_context_snapshot.bin
Resource
win11-20240709-en
Behavioral task
behavioral25
Sample
vk_swiftshader.dll
Resource
win11-20240709-en
General
-
Target
Readme.txt
-
Size
622B
-
MD5
adaeca265fa2a3f092ea42ba6025d01d
-
SHA1
99a47f67cc6194458f036b21e0939efa9f93adc3
-
SHA256
1adf40463cfe8c206a21041d5b7dcee8519474dc50edcb14d9bbacafeec044ae
-
SHA512
c59ee7fae1018dfc2b0993cb96e9c62955f0bba8354f38c5e9456c974a01c3a03083e7ae87cdcee41dc16be379579af51f8193ef668a30c93688805907d6f1ff
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-95457810-830748662-4054918673-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1448 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2876 wrote to memory of 1448 2876 cmd.exe 79 PID 2876 wrote to memory of 1448 2876 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Readme.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Readme.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1448
-