Resubmissions
22/07/2024, 06:49
240722-hltgastenn 120/07/2024, 22:09
240720-12vcmsxfkc 1020/07/2024, 22:06
240720-1z7j7ayhmq 320/07/2024, 22:05
240720-1zhaasyhln 320/07/2024, 22:03
240720-1ygmdaygrp 320/07/2024, 21:59
240720-1wg55aygml 3Analysis
-
max time kernel
19s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 22:05
Static task
static1
Behavioral task
behavioral1
Sample
archive.rar
Resource
win10v2004-20240709-en
7 signatures
150 seconds
General
-
Target
archive.rar
-
Size
11.5MB
-
MD5
691e3e042f77f3ca8b5344829029b272
-
SHA1
43f3a009a7bd9ce972be8992151240cda02eb598
-
SHA256
21a27ad9d564f6af8aa67437023baac60d5bad9316fac18dbace5af1ab85ec1f
-
SHA512
2917da919add222f47b69a5e93e62872e422d74e7308edd556e0e1084234a6545a8018852ece5bc15eb96c54a5a43371b1008cdb0157430d52a2ee6a0f6f27c7
-
SSDEEP
196608:1DOWMSWGX0Kb4zmkV0kPVhr6TmGeWgJazOarKlqlHSDWrVeL31DWmmvQP4ld:5OG5Bb4zlHPVheePayOesHU2VamvG4ld
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4868 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 556 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4868 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 45 IoCs
pid Process 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe 556 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 556 wrote to memory of 4868 556 OpenWith.exe 96 PID 556 wrote to memory of 4868 556 OpenWith.exe 96
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\archive.rar1⤵
- Modifies registry class
PID:3676
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\archive.rar2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:4868
-