Resubmissions

16/03/2025, 00:42

250316-a2mdxs1jv4 1

16/03/2025, 00:35

250316-axnq7azrv5 10

16/03/2025, 00:32

250316-avvfyszrs2 6

Analysis

  • max time kernel
    134s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/03/2025, 00:32

General

  • Target

    NoMoreRansom.zip

  • Size

    916KB

  • MD5

    f315e49d46914e3989a160bbcfc5de85

  • SHA1

    99654bfeaad090d95deef3a2e9d5d021d2dc5f63

  • SHA256

    5cbb6442c47708558da29588e0d8ef0b34c4716be4a47e7c715ea844fbcf60d7

  • SHA512

    224747b15d0713afcb2641f8f3aa1687516d42e045d456b3ed096a42757a6c10c6626672366c9b632349cf6ffe41011724e6f4b684837de9b719d0f351dfd22e

  • SSDEEP

    24576:+FhIdZxByAl+XiqNk6n3DaeCTLD1yilc7KrBVw1lFVFDqE/zQRsAOfySS:AhAgo2ikhryLD1hcerklFVhqEMiAuySS

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\NoMoreRansom.zip
    1⤵
      PID:636
    • C:\Windows\system32\SearchIndexer.exe
      C:\Windows\system32\SearchIndexer.exe /Embedding
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4260
      • C:\Windows\system32\SearchProtocolHost.exe
        "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
        2⤵
        • Modifies data under HKEY_USERS
        PID:1004
      • C:\Windows\system32\SearchFilterHost.exe
        "C:\Windows\system32\SearchFilterHost.exe" 0 804 808 816 8192 812 788
        2⤵
        • Modifies data under HKEY_USERS
        PID:2740

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2740-50-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-51-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-61-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-63-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-40-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-39-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-43-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-42-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-41-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-38-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-52-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-45-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-46-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-47-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-48-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-49-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-66-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-67-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-44-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-53-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-54-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-55-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-56-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-57-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-59-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-58-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-60-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-62-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-65-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/2740-64-0x0000027B267A0000-0x0000027B267B0000-memory.dmp

      Filesize

      64KB

    • memory/4260-0-0x0000016BB05E0000-0x0000016BB05F0000-memory.dmp

      Filesize

      64KB

    • memory/4260-16-0x0000016BB06E0000-0x0000016BB06F0000-memory.dmp

      Filesize

      64KB

    • memory/4260-36-0x0000016BB62D0000-0x0000016BB62D8000-memory.dmp

      Filesize

      32KB

    • memory/4260-32-0x0000016BB4BD0000-0x0000016BB4BD8000-memory.dmp

      Filesize

      32KB