Overview
overview
10Static
static
3Ransom.Win...wn.vbs
windows7-x64
Ransom.Win...rX.vbs
windows7-x64
10Ransom.Win...ig.vbs
windows7-x64
10other malw...00.exe
windows7-x64
other malw...us.exe
windows7-x64
7other malw...ld.exe
windows7-x64
7other malw...0r.exe
windows7-x64
10other malw...pe.exe
windows7-x64
3other malw...ro.exe
windows7-x64
other malw...ed.vbs
windows7-x64
9Analysis
-
max time kernel
300s -
max time network
271s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
Ransom.Win32.LCrypt0rX.A/LCrypt0rX with shutdown.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ransom.Win32.LCrypt0rX.A/LCrypt0rX.vbs
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
Ransom.Win32.LCrypt0rX.A/sig.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
other malware cuz why not/000.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
other malware cuz why not/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
other malware cuz why not/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
other malware cuz why not/[email protected]
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
other malware cuz why not/NoEscape.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
other malware cuz why not/WindowsAcceleratorPro.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
other malware cuz why not/loveletterworm fixed.vbs
Resource
win7-20241010-en
General
-
Target
other malware cuz why not/[email protected]
-
Size
2.0MB
-
MD5
c7e9746b1b039b8bd1106bca3038c38f
-
SHA1
cb93ac887876bafe39c5f9aa64970d5e747fb191
-
SHA256
b1369bd254d96f7966047ad4be06103830136629590182d49e5cb8680529ebd4
-
SHA512
cf5d688f1aec8ec65c1cb91d367da9a96911640c695d5c2d023836ef11e374ff158c152b4b6207e8fcdb5ccf0eed79741e080f1cbc915fe0af3dacd624525724
-
SSDEEP
49152:FH/1Fdq0wneDrEoYxWFjmYMcKabLVp3diY7kp:FH/1Fdq0nIo2YAcl/NisA
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\Antivirus = "\"C:\\Program Files (x86)\\AnVi\\avt.exe\" -noscan" [email protected] -
Drops file in Program Files directory 2 IoCs
Processes:
description ioc process File created C:\Program Files (x86)\AnVi\splash.mp3 [email protected] File created C:\Program Files (x86)\AnVi\virus.mp3 [email protected] -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
description ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mofcomp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main [email protected] Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Use FormSuggest = "Yes" [email protected] -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
mofcomp.exedescription pid process Token: SeSecurityPrivilege 2724 mofcomp.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
pid process 2080 [email protected] 2080 [email protected] 2080 [email protected] -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
pid process 2080 [email protected] 2080 [email protected] 2080 [email protected] -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
pid process 2080 [email protected] 2080 [email protected] 2080 [email protected] 2080 [email protected] 2080 [email protected] 2080 [email protected] 2080 [email protected] 2080 [email protected] 2080 [email protected] 2080 [email protected] -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
description pid process target process PID 2080 wrote to memory of 3052 2080 [email protected] net.exe PID 2080 wrote to memory of 3052 2080 [email protected] net.exe PID 2080 wrote to memory of 3052 2080 [email protected] net.exe PID 2080 wrote to memory of 3052 2080 [email protected] net.exe PID 2080 wrote to memory of 872 2080 [email protected] net.exe PID 2080 wrote to memory of 872 2080 [email protected] net.exe PID 2080 wrote to memory of 872 2080 [email protected] net.exe PID 2080 wrote to memory of 872 2080 [email protected] net.exe PID 2080 wrote to memory of 804 2080 [email protected] net.exe PID 2080 wrote to memory of 804 2080 [email protected] net.exe PID 2080 wrote to memory of 804 2080 [email protected] net.exe PID 2080 wrote to memory of 804 2080 [email protected] net.exe PID 2080 wrote to memory of 612 2080 [email protected] net.exe PID 2080 wrote to memory of 612 2080 [email protected] net.exe PID 2080 wrote to memory of 612 2080 [email protected] net.exe PID 2080 wrote to memory of 612 2080 [email protected] net.exe PID 2080 wrote to memory of 2724 2080 [email protected] mofcomp.exe PID 2080 wrote to memory of 2724 2080 [email protected] mofcomp.exe PID 2080 wrote to memory of 2724 2080 [email protected] mofcomp.exe PID 2080 wrote to memory of 2724 2080 [email protected] mofcomp.exe PID 3052 wrote to memory of 2856 3052 net.exe net1.exe PID 3052 wrote to memory of 2856 3052 net.exe net1.exe PID 3052 wrote to memory of 2856 3052 net.exe net1.exe PID 3052 wrote to memory of 2856 3052 net.exe net1.exe PID 804 wrote to memory of 3068 804 net.exe net1.exe PID 804 wrote to memory of 3068 804 net.exe net1.exe PID 804 wrote to memory of 3068 804 net.exe net1.exe PID 804 wrote to memory of 3068 804 net.exe net1.exe PID 872 wrote to memory of 2888 872 net.exe net1.exe PID 872 wrote to memory of 2888 872 net.exe net1.exe PID 872 wrote to memory of 2888 872 net.exe net1.exe PID 872 wrote to memory of 2888 872 net.exe net1.exe PID 612 wrote to memory of 2804 612 net.exe net1.exe PID 612 wrote to memory of 2804 612 net.exe net1.exe PID 612 wrote to memory of 2804 612 net.exe net1.exe PID 612 wrote to memory of 2804 612 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\other malware cuz why not\[email protected]"C:\Users\Admin\AppData\Local\Temp\other malware cuz why not\[email protected]"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net.exenet stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
-
C:\Windows\SysWOW64\net.exenet stop winmgmt /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winmgmt /y3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\net.exenet start winmgmt2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start winmgmt3⤵
- System Location Discovery: System Language Discovery
PID:3068
-
-
-
C:\Windows\SysWOW64\net.exenet start wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start wscsvc3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
-
C:\Windows\SysWOW64\Wbem\mofcomp.exemofcomp C:\Users\Admin\AppData\Local\Temp\4otjesjty.mof2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
443B
MD57fad92afda308dca8acfc6ff45c80c24
SHA1a7fa35e7f90f772fc943c2e940737a48b654c295
SHA25676e19416eb826a27bdcf626c3877cf7812bbe9b62cc2ccc5c2f65461d644246f
SHA51249eed1e1197401cb856064bf7fdbd9f3bc57f3c864d47f509346d44eed3b54757d8c6cdb6254990d21291065f0762d2a1588d09e43c5728f77a420f6a8dcd6ea