Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
maple.cpp
Resource
win7-20240903-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
maple.cpp
Resource
win10v2004-20241007-en
3 signatures
150 seconds
General
-
Target
maple.cpp
-
Size
4KB
-
MD5
fd6f959cbf67e0198ae6e57ce0785402
-
SHA1
19b2a28e1283db4eebad8f8349a7d315b0c8e5bc
-
SHA256
cd056b42941eb5a5f16ddb3e1807b7003e8ef83effd1877aa3922dd3de946a56
-
SHA512
b197466b06c7c73c8108f6a1b8fde5f5b260b65d2d95cb08fe25d10334fb214f02f0710520bb0bb83f67e750e9dbfacf7d0776ec1a539435cefc6071a7181bf7
-
SSDEEP
48:GUVRnizWFDodPevgRZb2p7HK/CUTq8LmAioKpO/0:Gc77gR12pHJeq6Ah
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2572 NOTEPAD.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2596 2716 cmd.exe 31 PID 2716 wrote to memory of 2596 2716 cmd.exe 31 PID 2716 wrote to memory of 2596 2716 cmd.exe 31 PID 2596 wrote to memory of 2572 2596 rundll32.exe 32 PID 2596 wrote to memory of 2572 2596 rundll32.exe 32 PID 2596 wrote to memory of 2572 2596 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\maple.cpp1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\maple.cpp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\maple.cpp3⤵
- Opens file in notepad (likely ransom note)
PID:2572
-
-