Resubmissions

12/12/2024, 07:37

241212-jf7x6sypal 10

12/12/2024, 07:25

241212-h8za3avjav 10

01/10/2024, 21:18

241001-z5vbda1ckm 10

01/10/2024, 21:17

241001-z5g12svcjh 10

01/10/2024, 21:14

241001-z3n2ks1bml 10

01/10/2024, 21:12

241001-z2cxxs1arl 10

Analysis

  • max time kernel
    575s
  • max time network
    362s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 21:18

General

  • Target

    240907-vd8mgatfqr_pw_infected.zip

  • Size

    2.4MB

  • MD5

    19686df02e548da3e143c3873ac823fc

  • SHA1

    0fa91a9de24c52d77d8dd47e4f8d80d690217952

  • SHA256

    8b41f26e3063ae451f14111c69d28929e0ead8fbe4f11a40257761766553e657

  • SHA512

    79c15cb87f036dae15617bdd5452ff00b04639cb6fcc43cba3d6816cefdf8fd0a0fea9e6a0675c7213d25190fc574a5a51dcaed877c2ad611cdfd4e6bf6a8c72

  • SSDEEP

    49152:MrLbijd0NP+tF6dDQaG+gleGpBpBgYApYVNUbNQQTatfeTbjwvA1PLs:MrKjuIoenleGp7+cVNaLetm/jwvA1PI

Score
10/10

Malware Config

Signatures

  • Detects Windows variants of RansomHub Ransomware 1 IoCs
  • Ransomhub Ransomware

    Ransomware first reported in Feburary 2024.

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\240907-vd8mgatfqr_pw_infected.zip
    1⤵
      PID:2000
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\New folder\" -an -ai#7zMap22581:160:7zEvent15847
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3004
    • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
      "C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:1732
    • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
      "C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      PID:2012
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe"
      1⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1640
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -h
        2⤵
        • Executes dropped EXE
        PID:3048
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe --pass hola -only-local
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1760
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe --pass hola -only-local -host 127.0.0.1
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2460
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -pass hola -only-local -host 127.0.0.1
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1984
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -pass hola -only-local -host 127.0.0.1 -[ath C://
        2⤵
        • Executes dropped EXE
        PID:2140
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -pass hola -only-local -host 127.0.0.1 -path C://
        2⤵
        • Executes dropped EXE
        PID:2204
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -pass hola -only-local -host 127.0.0.1 -path C://
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2548
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -pass hola -disable-net -path C://
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2864
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -pass hola -disable-net -path C://
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2720
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -pass hola -disable-net -path C:// -verbose - only-local
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2612
      • C:\Users\Admin\AppData\Local\Temp\New folder\rundll3.exe
        rundll3.exe -pass hola -disable-net -path C:// -verbose -only-local
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:2944

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\New folder\rundll3.exe

      Filesize

      5.6MB

      MD5

      be8e765b8622989c5e4aa6414c2b030c

      SHA1

      b6cb7f1ffcceff8fbe572594ffc6aa515420e0a0

      SHA256

      6fdb160c3b7a5813f187afd606ef2e24cfde0e66e3a0663ce65cd1372fdc32ab

      SHA512

      e0522301c8d2c156fe6157d7d1ca3a305078ed35bd3a2cf1131bea2a97246eaa8e00751cb4ad9c63e26d97149bdf5898da6d443d8c224735c81589462bd571ad