Overview
overview
10Static
static
3Ransom.Win...wn.vbs
windows7-x64
Ransom.Win...rX.vbs
windows7-x64
10Ransom.Win...ig.vbs
windows7-x64
10other malw...00.exe
windows7-x64
other malw...us.exe
windows7-x64
7other malw...ld.exe
windows7-x64
7other malw...0r.exe
windows7-x64
10other malw...pe.exe
windows7-x64
3other malw...ro.exe
windows7-x64
other malw...ed.vbs
windows7-x64
9Analysis
-
max time kernel
299s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
Ransom.Win32.LCrypt0rX.A/LCrypt0rX with shutdown.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ransom.Win32.LCrypt0rX.A/LCrypt0rX.vbs
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
Ransom.Win32.LCrypt0rX.A/sig.vbs
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
other malware cuz why not/000.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
other malware cuz why not/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
other malware cuz why not/[email protected]
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
other malware cuz why not/[email protected]
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
other malware cuz why not/NoEscape.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
other malware cuz why not/WindowsAcceleratorPro.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
other malware cuz why not/loveletterworm fixed.vbs
Resource
win7-20241010-en
General
-
Target
other malware cuz why not/[email protected]
-
Size
9.7MB
-
MD5
1f13396fa59d38ebe76ccc587ccb11bb
-
SHA1
867adb3076c0d335b9bfa64594ef37a7e2c951ff
-
SHA256
83ecb875f87150a88f4c3d496eb3cb5388cd8bafdff4879884ececdbd1896e1d
-
SHA512
82ca2c781bdaa6980f365d1eedb0af5ac5a80842f6edc28a23a5b9ea7b6feec5cd37d54bd08d9281c9ca534ed0047e1e234873b06c7d2b6fe23a7b88a4394fdc
-
SSDEEP
196608:CtbTP1ErBwMQjd1YTHdmpCP2PVgP/acIE/xQ0zyZejVk+YzbRdTZ:C1E1+dYx6OP9hdyZwV4zd
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
NavaShield.exeNavaBridge.exeNavaDebugger.exepid process 2656 NavaShield.exe 2768 NavaBridge.exe 1576 NavaDebugger.exe -
Loads dropped DLL 11 IoCs
Processes:
pid process 3052 [email protected] 2656 NavaShield.exe 2656 NavaShield.exe 2656 NavaShield.exe 2656 NavaShield.exe 2656 NavaShield.exe 2768 NavaBridge.exe 2768 NavaBridge.exe 2768 NavaBridge.exe 2656 NavaShield.exe 1576 NavaDebugger.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\NavaShield = "c:\\Nava Labs\\Nava Shield\\navashield.exe" [email protected] -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
description ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaShield.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaBridge.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NavaDebugger.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
NavaShield.exedescription ioc process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NavaShield.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString NavaShield.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
NavaShield.exepid process 2656 NavaShield.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
NavaShield.exepid process 2656 NavaShield.exe 2656 NavaShield.exe 2656 NavaShield.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
NavaShield.exepid process 2656 NavaShield.exe 2656 NavaShield.exe 2656 NavaShield.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
[email protected]NavaShield.exedescription pid process target process PID 3052 wrote to memory of 2656 3052 [email protected] NavaShield.exe PID 3052 wrote to memory of 2656 3052 [email protected] NavaShield.exe PID 3052 wrote to memory of 2656 3052 [email protected] NavaShield.exe PID 3052 wrote to memory of 2656 3052 [email protected] NavaShield.exe PID 2656 wrote to memory of 2768 2656 NavaShield.exe NavaBridge.exe PID 2656 wrote to memory of 2768 2656 NavaShield.exe NavaBridge.exe PID 2656 wrote to memory of 2768 2656 NavaShield.exe NavaBridge.exe PID 2656 wrote to memory of 2768 2656 NavaShield.exe NavaBridge.exe PID 2656 wrote to memory of 1576 2656 NavaShield.exe NavaDebugger.exe PID 2656 wrote to memory of 1576 2656 NavaShield.exe NavaDebugger.exe PID 2656 wrote to memory of 1576 2656 NavaShield.exe NavaDebugger.exe PID 2656 wrote to memory of 1576 2656 NavaShield.exe NavaDebugger.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\other malware cuz why not\[email protected]"C:\Users\Admin\AppData\Local\Temp\other malware cuz why not\[email protected]"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Nava Labs\Nava Shield\NavaShield.exe"C:\Nava Labs\Nava Shield\NavaShield.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Nava Labs\Nava Shield\NavaBridge.exe"C:\Nava Labs\Nava Shield\NavaBridge.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Nava Labs\Nava Shield\NavaDebugger.exe"C:\Nava Labs\Nava Shield\NavaDebugger.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD56f89df4cde193c0636c3d497cf1a17bf
SHA19faaa0100195e3e81fdade11e7a476a1fd1b23c8
SHA256e7f05380e90dfb15b91b8bbc2ae48a04ba84d573b3c9f7d81bcc12f814215929
SHA512c31848b1dceb8f8351991051b389a38b2ca0ae7ee98ebf626576245ca1588f1f6ee14e3eff7b165ecf9879e7e11ab77888e297cc4ccbb405b0ed64ebcda304b2
-
Filesize
92KB
MD5831295342c47b770bf7cc591a6916fa7
SHA12c9063fbf3f3363526abdc241bf90618b82446d1
SHA2568341ecc0938ca6d90b7e0f02af2d7e6b571c948a03a99d54af61c4557c78d656
SHA51201419defe963a987989cddb0e21cf651ec3eefeae97cf4b257d4caa8da26436a647e8e4d95cdad22bbb0657171f6d3d9c41dc6fb217ffc7d5172ebc9a409d36e
-
Filesize
10.0MB
MD547ef848562a159b2ce98d527ec968db2
SHA156b34310e8ede0437c422531bb89b2255a03cb3d
SHA2567d899d2d33bde1c7f55ba0fcd4630b817e42e5cd1ceb8739511a990455275f90
SHA512ac05354eacab4252e57151e98b8845d142b258590269ef92a724818623f2912b48341555ccc604a810e89ced3178ffc896ba116805ec3d129d9f6932296d935a
-
Filesize
5KB
MD53d7f80fb0534d24f95ee377c40b72fb3
SHA111b443ed953dae35d9c9905b5bbeb309049f3d36
SHA256abd84867d63a5449101b7171b1cc3907c44d7d327ea97d45b22a1015cc3af4dc
SHA5127fc741bbce281873134b9f4d68b74ae04daf943ea4c0c26e7e44579f2d51883c635972a405dd81cee63079a5ba9d09328a1e26e7878547590569806d219d83c7
-
Filesize
72KB
MD5de5eefa1b686e3d32e3ae265392492bd
SHA17b37b0ac1061366bf1a7f267392ebc0d606bb3db
SHA256a50e56dfb68410a7927ecd50f55044756b54868e920e462671162d1961bfe744
SHA512c71270a5275f91214444449be4923a70243a9e2cd06afcc6fd28ab9f2cd2d930219ce8ed9ec008750b2611b62ed26b65cb57a75c6035201cd9657263d157d508
-
Filesize
176B
MD5e66f1107f995d52bcd90421b3cdc0dde
SHA1245acafa2f3dab3f2b7f183d34267dcd976199c0
SHA25645fa6eacea58e682c2ef2bb9e888cb6bf396c37b957fd144ca73c95699ad3c74
SHA5120500f9dec5cfdfb80bc5763943deb3111ccde4b35f19ac124df2e5abde2681154977f160a42e9ef50698b0ea0cc26fc09361a3917534038f141dd047f0287c1f
-
Filesize
176B
MD506552ba21b610427f93f5ca67ac94e92
SHA13a250e6b6c080ab3d743e458e2b9d1bef6507b93
SHA25637d9a3d8c8e046c00169c19bfc691a46fea04b6a95e3169f2fdadfe5de49188e
SHA512feffe4782a75c25dd017897090b708541b965f66bb3ddd5d0477a72622ea5666e1c3ae5192a0051f0bf003b02a47a6fd320b9eb1c707e12440a528747a85cd25
-
Filesize
4KB
MD5389bf6e15ae0a7250f454da52aa7ced5
SHA11f6a6fe568a1b863bf1f8a9bec9fc8a67e04ca43
SHA2565993325acfe309946c176737a019aa16e22b921fa6387b766bf8bc8a504e220d
SHA51274bf5a1b5aaa4a27777ef98744aa5a4aac9dc2d64def7be42883d965e77c06852b8bd61c9b7620030c0b5d712ddefdbf0786d0696f62459e33a0debfbc62eb22
-
Filesize
4KB
MD55e704d5d840abb97d463a23ed27c2f70
SHA103b96628c71884a24bccbf09e6e98a4275fe3048
SHA25690b916dd1676ac5c5d698593a51d896a203c80a0f652b7b772fe90e674154f2a
SHA512b59da0e00589610d0260640fe5851cf51c4b9cb814d61f36badee9a2c22bca1690c5463bc3f1d19dd7cb1084094a4b48a895f77e2bb16c19fe6bbe199d543cfe
-
Filesize
255B
MD50bf850cb9d0aa0f4c778cc515b79bd13
SHA1c0cb8a58cba046d2c7539025a39c8a1af81c3914
SHA2569c4723ecb77e39e58eda9c60f532724aa3bf69de30047cc7b6522534cd423f00
SHA512649c13f9f4fccc03ebd6cb2c3752434c69b5a8d7e9b94cac80cd98a7624bfd00648949b18cd720faf89fae050f6b523221db589a550c6ce4513e76ff0895da5b
-
Filesize
1.2MB
MD5f96faa6ec671eaabc66ef44d5a715db2
SHA171b08ba07e5cea3490daeb4b75b4262b1e8a9821
SHA2566beae61ac55708892f869336fbf24f5987b433d3abe54f00bb69a098715caa1f
SHA512ab02f785eb412004de71337a016861e790c643bffb7b1ff87d3c7f62e9ebe139fb13b04c4605ff8f069e9e0eb032427e864a6d98af5b8e25fef770bb84272838
-
Filesize
96KB
MD5912924f628e277be9cc28a5f2a990cb9
SHA113c0166469a271497043a2f13e9a6a610dc2b336
SHA256bd474c5aafcaa12f20da5ecb29e17555b953eca46b4f56588a72672a36d4a8eb
SHA512b33b430254f9ec32ecd6224124db69af93de3cbfbaf422a0045641f7961834a67cba1b9fd97f4e0e903e27e3360301c5dba214a6b9156c4cdf8a25115b860c39
-
Filesize
136KB
MD5fcf3ac25f11ba7e8b31c4baf1910f7a6
SHA1fb470541f0b6b8f3ce69dcaa239ca9a7d7e91d72
SHA256e5b3249fbeea8395fd56c20511bfcfdb2b2632d3c8d517b943466a4e47f97b5c
SHA51247c467924d64af4a48a6e640778aca1dce379d16b06bf3f60a44025034c15ce1498ef307b63cb04e5c0cbb6c2ac58022acdb0d6efb1109c5ea31f842a320aa40
-
Filesize
23.8MB
MD59d299e41bae269641af28a6c02b80ef6
SHA166114e20ddf19e657d29aa2d1ac56ea93c62d130
SHA256fce1bc05fbe2de83ee535e5ce0ceee94f2b4f917cdcbe1f1f649f44be25d4ec8
SHA51226e01252b6caea9122734485654848d31c7f3dd06cf7fcc2806ba2b0705cb914b6b7b4e38ff1f23a5c373277e23d64320844e9882bef4ed27eb68d7ecce5de28