Resubmissions
04-12-2024 04:28
241204-e3ta3sxlep 104-12-2024 03:02
241204-djgmhatpdm 104-12-2024 02:46
241204-c9ep6axpg1 10Analysis
-
max time kernel
107s -
max time network
106s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04-12-2024 03:02
Static task
static1
Behavioral task
behavioral1
Sample
yyy.zip
Resource
win10ltsc2021-20241023-en
General
-
Target
yyy.zip
-
Size
2.8MB
-
MD5
a9cb224f62e40601a10af5824a331248
-
SHA1
1ce3c4fdedf57af3994b4625d43304861a3e13ec
-
SHA256
c0adaa84600a272780e9937a647329dca67e6c004f5b58098139af09fc2e7b1c
-
SHA512
269182c309bdfaae0878708bf539db4cebba8e5c09a528b54c89c1a5a80771e53bf1e8d0b9b5952e3c2ae2906600a4929014dba501f973c01f9652bd78cbd564
-
SSDEEP
49152:Ylz3lEDThXBJOhHcx6J6h2SFFGf0RBNTQfYc9jh23eWeB3/YSBm7WIqRpykTS098:aGFXamhRFY89YYc9jh23redpmQRl1ZGv
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4712 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4536 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4536 7zFM.exe Token: 35 4536 7zFM.exe Token: SeSecurityPrivilege 4536 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4536 7zFM.exe 4536 7zFM.exe 4536 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\yyy.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4536
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\client32.ini1⤵
- Opens file in notepad (likely ransom note)
PID:4712
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671B
MD51f3911aa581f74218174a75d1d44aebe
SHA167cac52f8457c77a93338109d6615145d1148e17
SHA256010dc2cdbdbca9199aca04a93165259b48bbacaafd142d0597e2b168b0c7809e
SHA512c5d825bcd2c44f8e83ef1b3a0f185f93c23e365cff55051231c676fc5b68dbf50ef7a6a466e1b2fd3b3c942b68270207e08eb18aba04e768226419c8054ad30f