Analysis
-
max time kernel
79s -
max time network
81s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18/08/2024, 19:23
Behavioral task
behavioral1
Sample
bin.sh
Resource
win10-20240404-en
5 signatures
150 seconds
General
-
Target
bin.sh
-
Size
132KB
-
MD5
a73ddd6ec22462db955439f665cad4e6
-
SHA1
ac6962542a4b23ac13bddff22f8df9aeb702ef12
-
SHA256
b5cf68c7cb5bb2d21d60bf6654926f61566d95bfd7c9f9e182d032f1da5b4605
-
SHA512
92a52f68a7324c4d5876e1f7e2cb87d14b8604b057ceee2e537815568faa96abf576a22111c5c976eff72ab9015f1261b2331d4b4d711f4e62c8eb403c2377aa
-
SSDEEP
3072:2glZ3FtCKXhkmHtZ9TEKzjfj/WMngyIfsJ0F7xPtoM:2IIKXhZtL7jOTyIG87Xl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4200 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 164 OpenWith.exe 164 OpenWith.exe 164 OpenWith.exe 164 OpenWith.exe 164 OpenWith.exe 164 OpenWith.exe 164 OpenWith.exe 164 OpenWith.exe 164 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 164 wrote to memory of 4200 164 OpenWith.exe 75 PID 164 wrote to memory of 4200 164 OpenWith.exe 75
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\bin.sh1⤵
- Modifies registry class
PID:3460
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:164 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\bin.sh2⤵
- Opens file in notepad (likely ransom note)
PID:4200
-