Resubmissions

16/03/2025, 00:42

250316-a2mdxs1jv4 1

16/03/2025, 00:35

250316-axnq7azrv5 10

16/03/2025, 00:32

250316-avvfyszrs2 6

Analysis

  • max time kernel
    149s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    16/03/2025, 00:32

General

  • Target

    NoMoreRansom.zip

  • Size

    916KB

  • MD5

    f315e49d46914e3989a160bbcfc5de85

  • SHA1

    99654bfeaad090d95deef3a2e9d5d021d2dc5f63

  • SHA256

    5cbb6442c47708558da29588e0d8ef0b34c4716be4a47e7c715ea844fbcf60d7

  • SHA512

    224747b15d0713afcb2641f8f3aa1687516d42e045d456b3ed096a42757a6c10c6626672366c9b632349cf6ffe41011724e6f4b684837de9b719d0f351dfd22e

  • SSDEEP

    24576:+FhIdZxByAl+XiqNk6n3DaeCTLD1yilc7KrBVw1lFVFDqE/zQRsAOfySS:AhAgo2ikhryLD1hcerklFVhqEMiAuySS

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\NoMoreRansom.zip
    1⤵
      PID:1084
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2704
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:580
      • C:\Windows\system32\SearchIndexer.exe
        C:\Windows\system32\SearchIndexer.exe /Embedding
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2616
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3692679935-4019334568-335155002-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3692679935-4019334568-335155002-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
          2⤵
          • Suspicious use of SetWindowsHookEx
          PID:2120
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
          2⤵
          • Modifies data under HKEY_USERS
          PID:2140
        • C:\Windows\system32\SearchProtocolHost.exe
          "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
          2⤵
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1596
        • C:\Windows\system32\SearchFilterHost.exe
          "C:\Windows\system32\SearchFilterHost.exe" 0 512 516 524 65536 520
          2⤵
            PID:2956

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Search\Data\Applications\Windows\MSS.log

          Filesize

          1024KB

          MD5

          51da34a4f22540e7676f7e66bbb3d544

          SHA1

          963a8594079797affc9f8761097d2923fbdaaa79

          SHA256

          9f28ece875b6bbe68f45aa53fc6d82f4891ba8112988e67c9d09c564ff6fced6

          SHA512

          33cc454adcbf59703a93e68a0523ff49a6e5dea120cfb16f4e5b74417b0bff426e8cf6c6adca7cc92c2a7f65ce626e7eece84b8f3f5c4199afce2a7a6c6f524f

        • memory/580-0-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/580-68-0x0000000001FE0000-0x0000000001FF0000-memory.dmp

          Filesize

          64KB

        • memory/580-65-0x0000000140000000-0x00000001405E8000-memory.dmp

          Filesize

          5.9MB

        • memory/2616-46-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

          Filesize

          4KB

        • memory/2616-73-0x0000000003280000-0x0000000003288000-memory.dmp

          Filesize

          32KB

        • memory/2616-52-0x0000000001130000-0x0000000001138000-memory.dmp

          Filesize

          32KB

        • memory/2616-54-0x0000000000EF0000-0x0000000000EF1000-memory.dmp

          Filesize

          4KB

        • memory/2616-63-0x0000000002B90000-0x0000000002B98000-memory.dmp

          Filesize

          32KB

        • memory/2616-1-0x0000000001780000-0x0000000001790000-memory.dmp

          Filesize

          64KB

        • memory/2616-17-0x0000000001880000-0x0000000001890000-memory.dmp

          Filesize

          64KB

        • memory/2616-40-0x0000000001130000-0x0000000001138000-memory.dmp

          Filesize

          32KB

        • memory/2616-77-0x00000000035F0000-0x00000000035F1000-memory.dmp

          Filesize

          4KB

        • memory/2616-83-0x0000000003600000-0x0000000003608000-memory.dmp

          Filesize

          32KB

        • memory/2616-84-0x00000000035F0000-0x00000000035F1000-memory.dmp

          Filesize

          4KB

        • memory/2616-87-0x00000000035F0000-0x00000000035F8000-memory.dmp

          Filesize

          32KB

        • memory/2616-89-0x0000000004AF0000-0x0000000004AF1000-memory.dmp

          Filesize

          4KB

        • memory/2616-97-0x0000000005210000-0x0000000005218000-memory.dmp

          Filesize

          32KB

        • memory/2616-98-0x0000000005270000-0x0000000005278000-memory.dmp

          Filesize

          32KB

        • memory/2616-99-0x0000000005260000-0x0000000005261000-memory.dmp

          Filesize

          4KB