Overview
overview
9Static
static
3Hash_Suite..._7.zip
windows11-21h2-x64
1Hash_Suite...ng.jar
windows11-21h2-x64
1Hash_Suite...56.jar
windows11-21h2-x64
1Hash_Suite...jasper
windows11-21h2-x64
3Hash_Suite...on.png
windows11-21h2-x64
3Hash_Suite...pt.txt
windows11-21h2-x64
3Hash_Suite...cc.txt
windows11-21h2-x64
3Hash_Suite...c2.txt
windows11-21h2-x64
3Hash_Suite...pt.txt
windows11-21h2-x64
3Hash_Suite...mp.txt
windows11-21h2-x64
3Hash_Suite...d5.txt
windows11-21h2-x64
3Hash_Suite...a1.txt
windows11-21h2-x64
3Hash_Suite...56.txt
windows11-21h2-x64
3Hash_Suite...12.txt
windows11-21h2-x64
3Hash_Suite...pt.txt
windows11-21h2-x64
3Hash_Suite...pt.txt
windows11-21h2-x64
3Hash_Suite...ha.txt
windows11-21h2-x64
3Hash_Suite...sk.txt
windows11-21h2-x64
3Hash_Suite...n.pcap
windows11-21h2-x64
3Hash_Suite...ys.cap
windows11-21h2-x64
3Hash_Suite...pa.cap
windows11-21h2-x64
3Hash_Suite...ys.cap
windows11-21h2-x64
3Hash_Suite...ol.cap
windows11-21h2-x64
3Hash_Suite...e.pcap
windows11-21h2-x64
3Hash_Suite...ME.txt
windows11-21h2-x64
3Hash_Suite...ry.exe
windows11-21h2-x64
9Hash_Suite...32.dat
windows11-21h2-x64
3Hash_Suite...64.dat
windows11-21h2-x64
3Hash_Suite...32.exe
windows11-21h2-x64
3Hash_Suite...64.exe
windows11-21h2-x64
1Hash_Suite...DB.exe
windows11-21h2-x64
3Hash_Suite...ll.vbs
windows11-21h2-x64
1Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-09-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
Hash_Suite_Free_3_7.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Hash_Suite_Free/Reports/ReportAppMain_lib/spring.jar
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Hash_Suite_Free/Reports/ReportAppMain_lib/sqlitejdbc-v056.jar
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Hash_Suite_Free/Reports/WordList.jasper
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Hash_Suite_Free/Reports/reportIcon.png
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Hash_Suite_Free/Samples/sample_bcrypt.txt
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Hash_Suite_Free/Samples/sample_dcc.txt
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Hash_Suite_Free/Samples/sample_dcc2.txt
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Hash_Suite_Free/Samples/sample_md5crypt.txt
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Hash_Suite_Free/Samples/sample_pwdump.txt
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Hash_Suite_Free/Samples/sample_raw_md5.txt
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Hash_Suite_Free/Samples/sample_raw_sha1.txt
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Hash_Suite_Free/Samples/sample_raw_sha256.txt
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
Hash_Suite_Free/Samples/sample_raw_sha512.txt
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Hash_Suite_Free/Samples/sample_sha256crypt.txt
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
Hash_Suite_Free/Samples/sample_sha512crypt.txt
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Hash_Suite_Free/Samples/sample_ssha.txt
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
Hash_Suite_Free/Samples/sample_wpa_psk.txt
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
Hash_Suite_Free/Samples/wpa-Induction.pcap
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
Hash_Suite_Free/Samples/wpa-psk-linksys.cap
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
Hash_Suite_Free/Samples/wpa.cap
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
Hash_Suite_Free/Samples/wpa2-psk-linksys.cap
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
Hash_Suite_Free/Samples/wpa2.eapol.cap
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
Hash_Suite_Free/Samples/wpa_Network_Join_Nokia_Mobile.pcap
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
Hash_Suite_Free/Samples/wpa_captures_README.txt
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
Hash_Suite_Free/Tools/Backup_Registry.exe
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
Hash_Suite_Free/Tools/CredDump_32.dat
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
Hash_Suite_Free/Tools/CredDump_64.dat
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
Hash_Suite_Free/Tools/Hashes_Dump_32.exe
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
Hash_Suite_Free/Tools/Hashes_Dump_64.exe
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
Hash_Suite_Free/Tools/ResetDB.exe
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
Hash_Suite_Free/Wordlists/wordlist_small.vbs
Resource
win11-20240802-en
General
-
Target
Hash_Suite_Free/Samples/sample_raw_sha1.txt
-
Size
1KB
-
MD5
34cd109d2f9b8a3af878464fd756d006
-
SHA1
6c09346222d97660e1691c3bc2fd7003b4c55abc
-
SHA256
47f19ac8b5de2da00918db4c3320207ee430b616f0db54eb69dc1fe93ab5a86a
-
SHA512
fe1656d56cda3ce9548cedee0e0876e61756b86be12bbea6e1e57d0573dc2ec1c21c6cd7196429cfc84ad0ab5296d4bd7a97485483729268a92a1620e6112418
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 4712 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 2084 wrote to memory of 4712 2084 cmd.exe NOTEPAD.EXE PID 2084 wrote to memory of 4712 2084 cmd.exe NOTEPAD.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Hash_Suite_Free\Samples\sample_raw_sha1.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Hash_Suite_Free\Samples\sample_raw_sha1.txt2⤵
- Opens file in notepad (likely ransom note)
PID:4712