Analysis
-
max time kernel
139s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
infinity source.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
source/LICENSE
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
source/README.md
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
source/source.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe
Resource
win10v2004-20240709-en
General
-
Target
source/README.md
-
Size
70B
-
MD5
39148bc21924851d9082b687dc69e2dc
-
SHA1
5d1e5490476227aa8877b87aad184031e19dc33a
-
SHA256
76a94c98df32a1d37cc7f1e2b86bdc524eda3fedcdb35e57de0dd56bd976142f
-
SHA512
2415bb9de017c086abf8315e4288a04d5eb6048af2637e75843778f24de6834154b68365794b6cbc09ef5da0fe96d5bfce20227bf3656d23b7f148fb60988041
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3516 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3096 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe 3096 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3096 wrote to memory of 3516 3096 OpenWith.exe 98 PID 3096 wrote to memory of 3516 3096 OpenWith.exe 98
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source\README.md1⤵
- Modifies registry class
PID:1672
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\source\README.md2⤵
- Opens file in notepad (likely ransom note)
PID:3516
-