Resubmissions
24-08-2021 14:41
210824-gbqdf47416 1023-08-2021 18:15
210823-78r35g4gms 1019-12-2020 05:48
201219-8fefrsq5f2 10Analysis
-
max time kernel
150s -
max time network
15s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
23-08-2021 18:15
Static task
static1
Behavioral task
behavioral1
Sample
37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe
Resource
win7v20210408
General
-
Target
37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe
-
Size
539KB
-
MD5
10fda777cc56f004e90a4037e1e2cdcc
-
SHA1
2827b8e86f8eb6a2f07ed13d7e237eef5420e5e9
-
SHA256
37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028
-
SHA512
9a9c6af054c8bc6d53e44dcb1650b17409d2229d539272d73b86c001a04f775d78c543361c4d8d53204a4519899ca31a3e4db31e02503e17a561621dc15ff088
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ctl3prop.exepid process 1580 ctl3prop.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1684 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\dcimLSys = "C:\\Users\\Admin\\AppData\\Roaming\\bididlgs\\ctl3prop.exe" 37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.execmd.execmd.exedescription pid process target process PID 1944 wrote to memory of 1660 1944 37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe cmd.exe PID 1944 wrote to memory of 1660 1944 37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe cmd.exe PID 1944 wrote to memory of 1660 1944 37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe cmd.exe PID 1944 wrote to memory of 1660 1944 37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe cmd.exe PID 1660 wrote to memory of 1684 1660 cmd.exe cmd.exe PID 1660 wrote to memory of 1684 1660 cmd.exe cmd.exe PID 1660 wrote to memory of 1684 1660 cmd.exe cmd.exe PID 1660 wrote to memory of 1684 1660 cmd.exe cmd.exe PID 1684 wrote to memory of 1580 1684 cmd.exe ctl3prop.exe PID 1684 wrote to memory of 1580 1684 cmd.exe ctl3prop.exe PID 1684 wrote to memory of 1580 1684 cmd.exe ctl3prop.exe PID 1684 wrote to memory of 1580 1684 cmd.exe ctl3prop.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe"C:\Users\Admin\AppData\Local\Temp\37e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\911A\C88D.bat" "C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe" "C:\Users\Admin\AppData\Local\Temp\37E185~1.EXE""2⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd /C ""C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe" "C:\Users\Admin\AppData\Local\Temp\37E185~1.EXE""3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe"C:\Users\Admin\AppData\Roaming\bididlgs\ctl3prop.exe" "C:\Users\Admin\AppData\Local\Temp\37E185~1.EXE"4⤵
- Executes dropped EXE
PID:1580
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3e1f8dfc8ad1e573743156fd2bd7af64
SHA150b47d8af0e4da85007e1fca873f9fa9d475fca1
SHA256385c03673b6cbb7cb6b5d545ea2a4ff1f646471d82c27a9a99cb5abf5413caf9
SHA5124f63fb1966f887b1f3dc4995e3a04e8ab26286af33e3cba6891eb3ed6fe0e87aec7637c4281c6005ac924fc89b257ba2b323aef683384cd27329286a3b690516
-
MD5
10fda777cc56f004e90a4037e1e2cdcc
SHA12827b8e86f8eb6a2f07ed13d7e237eef5420e5e9
SHA25637e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028
SHA5129a9c6af054c8bc6d53e44dcb1650b17409d2229d539272d73b86c001a04f775d78c543361c4d8d53204a4519899ca31a3e4db31e02503e17a561621dc15ff088
-
MD5
10fda777cc56f004e90a4037e1e2cdcc
SHA12827b8e86f8eb6a2f07ed13d7e237eef5420e5e9
SHA25637e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028
SHA5129a9c6af054c8bc6d53e44dcb1650b17409d2229d539272d73b86c001a04f775d78c543361c4d8d53204a4519899ca31a3e4db31e02503e17a561621dc15ff088
-
MD5
10fda777cc56f004e90a4037e1e2cdcc
SHA12827b8e86f8eb6a2f07ed13d7e237eef5420e5e9
SHA25637e185e2b05b3d448b2096d3b5d104fafce47991e6a7634340c1b28b2bee8028
SHA5129a9c6af054c8bc6d53e44dcb1650b17409d2229d539272d73b86c001a04f775d78c543361c4d8d53204a4519899ca31a3e4db31e02503e17a561621dc15ff088