Analysis
-
max time kernel
43s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
Lol.mdp
Resource
win10v2004-20240802-en
8 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
Lol.mdp
-
Size
122KB
-
MD5
e55903e022658bacdcde2ecfbcfc5943
-
SHA1
7825fc20a62ee889a9104e98be337e48d7047e7d
-
SHA256
8ae081f18c9297e9dab3eebb56acba0293f4feb6c68ed45acdb37a367a56ccdf
-
SHA512
8ffcb30c99736ae23d8b2d00e2688ca2d63f17af21bc350937552146c255e1e2f1365323a7b3ee4dd553fb51111e56074e12a383fb4a8d379afa167c6c2da811
-
SSDEEP
3072:fFVICcwXS6RGs4tNc22MF7uf+PTo0nye8aJ2YcoE2C9gRY:f8CcwXS6RGltm+af+PTo0nye8aJ2Yco2
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "58" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4516 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4488 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4516 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 42 IoCs
pid Process 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4324 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4488 wrote to memory of 4516 4488 OpenWith.exe 89 PID 4488 wrote to memory of 4516 4488 OpenWith.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Lol.mdp1⤵
- Modifies registry class
PID:116
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Lol.mdp2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:4516
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3416
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa394a055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4324