Overview
overview
10Static
static
3@^NewFile_...^$.zip
windows11-21h2-x64
1@^NewFile_...^$.rar
windows11-21h2-x64
1Resource/L...me.xml
windows11-21h2-x64
1Resource/L...UI.dll
windows11-21h2-x64
1Resource/L...UI.xml
windows11-21h2-x64
1Resource/L...op.dll
windows11-21h2-x64
1Resource/L...to.xml
windows11-21h2-x64
1Resource/L...op.dll
windows11-21h2-x64
3Resource/S...di.spp
windows11-21h2-x64
3Resource/T...6l.dat
windows11-21h2-x64
4Resource/T...ol.txt
windows11-21h2-x64
3Resource/T...at.txt
windows11-21h2-x64
3Resource/T...RO.txt
windows11-21h2-x64
3Resource/T...AR.txt
windows11-21h2-x64
3Resource/T...AN.txt
windows11-21h2-x64
3Resource/T...IC.txt
windows11-21h2-x64
3Resource/opengl64.dll
windows11-21h2-x64
1Setup.exe
windows11-21h2-x64
10fxsound/EX...in.dll
windows11-21h2-x64
3fxsound/MS...in.dll
windows11-21h2-x64
3fxsound/So...in.dll
windows11-21h2-x64
3fxsound/So...es.dll
windows11-21h2-x64
3fxsound/WM...ng.dll
windows11-21h2-x64
3fxsound/WMPNSSUI.dll
windows11-21h2-x64
3fxsound/wmpnssci.dll
windows11-21h2-x64
3glioma.asp
windows11-21h2-x64
3libvlc.dll
windows11-21h2-x64
3libvlccore.dll
windows11-21h2-x64
3plugins/Cr...32.dll
windows11-21h2-x64
3plugins/Cr...64.dll
windows11-21h2-x64
1@^NewFile_...��.css
windows11-21h2-x64
1PaSṣCoḒḕ.css
windows11-21h2-x64
3Analysis
-
max time kernel
110s -
max time network
143s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05/08/2024, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
@^NewFile_2024_UseAs_ṔḁṨṨCṏḌḙ^$.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
@^NewFile_2024_UseAs_ṔḁṨṨCṏḌḙ^$/@^NewFile_2024_UseAs_ṔḁṨṨCṏḌḙ^$.rar
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Resource/Locals/x64/AdonisUI.ClassicTheme.xml
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Resource/Locals/x64/AdonisUI.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Resource/Locals/x64/AdonisUI.xml
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Resource/Locals/x64/SQLite.Interop.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Resource/Locals/x86/BouncyCastle.Crypto.xml
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Resource/Locals/x86/SQLite.Interop.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Resource/SaslPrep/SaslPrepProfile_norm_bidi.spp
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Resource/TypeSupport/Unicode/ICU/icudt26l.dat
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Resource/TypeSupport/Unicode/Mappings/Adobe/symbol.txt
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Resource/TypeSupport/Unicode/Mappings/Adobe/zdingbat.txt
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Resource/TypeSupport/Unicode/Mappings/Mac/CENTEURO.txt
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
Resource/TypeSupport/Unicode/Mappings/Mac/CORPCHAR.txt
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Resource/TypeSupport/Unicode/Mappings/Mac/CROATIAN.txt
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
Resource/TypeSupport/Unicode/Mappings/Mac/CYRILLIC.txt
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Resource/opengl64.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
Setup.exe
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
fxsound/EXEInstallPlugin.dll
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
fxsound/MSIInstallPlugin.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
fxsound/SoftwareUpdateAdmin.dll
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
fxsound/SoftwareUpdateFiles.dll
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
fxsound/WMPMediaSharing.dll
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
fxsound/WMPNSSUI.dll
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
fxsound/wmpnssci.dll
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
glioma.asp
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
libvlc.dll
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
libvlccore.dll
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
plugins/CryptoPP530Fips32.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
plugins/CryptoPP530Fips64.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
@^NewFile_2024_UseAs_ṔḁṨṨCṏḌḙ^$/PaSṣCoḒḕ.css
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
PaSṣCoḒḕ.css
Resource
win11-20240802-en
General
-
Target
Resource/TypeSupport/Unicode/Mappings/Adobe/symbol.txt
-
Size
10KB
-
MD5
31d752fa13b4d1fc7b7b4747a3f6d3f9
-
SHA1
eaafd280b2ea187f078674b9a1d5a8206ccf4a13
-
SHA256
52dbabcdebe38f3e19e9071d6796fe49f1463f03d2d82064aab4a10bfbd4dddf
-
SHA512
ed402d201b19c9edeeefa17d2f82a480b8d16ce3235668a91bdd0e6f3b59cbb55bc7119a272c34d1c4e88999b6fe08697d65d65e7b4de44c197e57f2ff44f079
-
SSDEEP
192:sRDIlhfxjh5/q7Wr6KyfyHnW9WSQftm15VkCnl2moTTEmbZ3mrZWlBAjnBmnVRn8:sVCx27WuKy0W9WDlSVPlwd3C/BCVBFyB
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3572 cmd.exe 2324 NOTEPAD.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1287768749-810021449-2672985988-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2324 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3572 wrote to memory of 2324 3572 cmd.exe 83 PID 3572 wrote to memory of 2324 3572 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt1⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Resource\TypeSupport\Unicode\Mappings\Adobe\symbol.txt2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Opens file in notepad (likely ransom note)
PID:2324
-