Overview
overview
9Static
static
3Hash_Suite..._7.zip
windows11-21h2-x64
1Hash_Suite...ng.jar
windows11-21h2-x64
1Hash_Suite...56.jar
windows11-21h2-x64
1Hash_Suite...jasper
windows11-21h2-x64
3Hash_Suite...on.png
windows11-21h2-x64
3Hash_Suite...pt.txt
windows11-21h2-x64
3Hash_Suite...cc.txt
windows11-21h2-x64
3Hash_Suite...c2.txt
windows11-21h2-x64
3Hash_Suite...pt.txt
windows11-21h2-x64
3Hash_Suite...mp.txt
windows11-21h2-x64
3Hash_Suite...d5.txt
windows11-21h2-x64
3Hash_Suite...a1.txt
windows11-21h2-x64
3Hash_Suite...56.txt
windows11-21h2-x64
3Hash_Suite...12.txt
windows11-21h2-x64
3Hash_Suite...pt.txt
windows11-21h2-x64
3Hash_Suite...pt.txt
windows11-21h2-x64
3Hash_Suite...ha.txt
windows11-21h2-x64
3Hash_Suite...sk.txt
windows11-21h2-x64
3Hash_Suite...n.pcap
windows11-21h2-x64
3Hash_Suite...ys.cap
windows11-21h2-x64
3Hash_Suite...pa.cap
windows11-21h2-x64
3Hash_Suite...ys.cap
windows11-21h2-x64
3Hash_Suite...ol.cap
windows11-21h2-x64
3Hash_Suite...e.pcap
windows11-21h2-x64
3Hash_Suite...ME.txt
windows11-21h2-x64
3Hash_Suite...ry.exe
windows11-21h2-x64
9Hash_Suite...32.dat
windows11-21h2-x64
3Hash_Suite...64.dat
windows11-21h2-x64
3Hash_Suite...32.exe
windows11-21h2-x64
3Hash_Suite...64.exe
windows11-21h2-x64
1Hash_Suite...DB.exe
windows11-21h2-x64
3Hash_Suite...ll.vbs
windows11-21h2-x64
1Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-09-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
Hash_Suite_Free_3_7.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Hash_Suite_Free/Reports/ReportAppMain_lib/spring.jar
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Hash_Suite_Free/Reports/ReportAppMain_lib/sqlitejdbc-v056.jar
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Hash_Suite_Free/Reports/WordList.jasper
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Hash_Suite_Free/Reports/reportIcon.png
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Hash_Suite_Free/Samples/sample_bcrypt.txt
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Hash_Suite_Free/Samples/sample_dcc.txt
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
Hash_Suite_Free/Samples/sample_dcc2.txt
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
Hash_Suite_Free/Samples/sample_md5crypt.txt
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
Hash_Suite_Free/Samples/sample_pwdump.txt
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
Hash_Suite_Free/Samples/sample_raw_md5.txt
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
Hash_Suite_Free/Samples/sample_raw_sha1.txt
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
Hash_Suite_Free/Samples/sample_raw_sha256.txt
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
Hash_Suite_Free/Samples/sample_raw_sha512.txt
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
Hash_Suite_Free/Samples/sample_sha256crypt.txt
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
Hash_Suite_Free/Samples/sample_sha512crypt.txt
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
Hash_Suite_Free/Samples/sample_ssha.txt
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
Hash_Suite_Free/Samples/sample_wpa_psk.txt
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
Hash_Suite_Free/Samples/wpa-Induction.pcap
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
Hash_Suite_Free/Samples/wpa-psk-linksys.cap
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
Hash_Suite_Free/Samples/wpa.cap
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
Hash_Suite_Free/Samples/wpa2-psk-linksys.cap
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
Hash_Suite_Free/Samples/wpa2.eapol.cap
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
Hash_Suite_Free/Samples/wpa_Network_Join_Nokia_Mobile.pcap
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
Hash_Suite_Free/Samples/wpa_captures_README.txt
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
Hash_Suite_Free/Tools/Backup_Registry.exe
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
Hash_Suite_Free/Tools/CredDump_32.dat
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
Hash_Suite_Free/Tools/CredDump_64.dat
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
Hash_Suite_Free/Tools/Hashes_Dump_32.exe
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
Hash_Suite_Free/Tools/Hashes_Dump_64.exe
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
Hash_Suite_Free/Tools/ResetDB.exe
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
Hash_Suite_Free/Wordlists/wordlist_small.vbs
Resource
win11-20240802-en
General
-
Target
Hash_Suite_Free/Samples/sample_dcc2.txt
-
Size
635B
-
MD5
30d324e27cea835cfae205a2bd224d86
-
SHA1
fe4c68da15ceba82ea9f4fd07ed237a5d2546016
-
SHA256
a1835e7530c16be57b0fdbdd6e63d841d8793e6040066691cc878653839f9cb1
-
SHA512
726c1b1d051c5604c740695f23743384b0c087fa75fcf48c27d08af0bd258da5828dfe2fbfb83e0de63113c662333546dcbe38567fbfb66b24cd3a793617d908
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 3200 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 3756 wrote to memory of 3200 3756 cmd.exe NOTEPAD.EXE PID 3756 wrote to memory of 3200 3756 cmd.exe NOTEPAD.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Hash_Suite_Free\Samples\sample_dcc2.txt1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Hash_Suite_Free\Samples\sample_dcc2.txt2⤵
- Opens file in notepad (likely ransom note)
PID:3200