Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-04-2022 04:40
Static task
static1
Behavioral task
behavioral1
Sample
341d69cf4f5d9be493ebe9913f4150cf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
341d69cf4f5d9be493ebe9913f4150cf.exe
Resource
win10v2004-20220414-en
General
-
Target
341d69cf4f5d9be493ebe9913f4150cf.exe
-
Size
1.1MB
-
MD5
341d69cf4f5d9be493ebe9913f4150cf
-
SHA1
b043c610bf6b1fea68701910870d439501d8f832
-
SHA256
ea315e9e65af9d1d95ac0636abde389107bb131f99e9eeac2dd16821be1ba888
-
SHA512
50534e155760d2dde64e0737f90b63d35c1b0e3136007476d9e62b8eaf0bfb42225a57dc340c12e45a7346cdf56a857e403b4230d561b32991f1155f4d8294ab
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 956 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1888 set thread context of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 47 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform ID 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information 341d69cf4f5d9be493ebe9913f4150cf.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Signature rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 341d69cf4f5d9be493ebe9913f4150cf.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 341d69cf4f5d9be493ebe9913f4150cf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Signature 341d69cf4f5d9be493ebe9913f4150cf.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet 341d69cf4f5d9be493ebe9913f4150cf.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 341d69cf4f5d9be493ebe9913f4150cf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 956 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 28 PID 1888 wrote to memory of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30 PID 1888 wrote to memory of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30 PID 1888 wrote to memory of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30 PID 1888 wrote to memory of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30 PID 1888 wrote to memory of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30 PID 1888 wrote to memory of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30 PID 1888 wrote to memory of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30 PID 1888 wrote to memory of 1884 1888 341d69cf4f5d9be493ebe9913f4150cf.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe"C:\Users\Admin\AppData\Local\Temp\341d69cf4f5d9be493ebe9913f4150cf.exe"1⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
PID:956
-
-
C:\Windows\syswow64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Checks processor information in registry
PID:1884
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5275f5752b1f0086ddaceb8abab43f86c
SHA119a4a3852df53c5cbd7351f441d6d626610ec253
SHA256f415df3c22123988e6a21a36b35471fbb4b0ab42682b95a2151995530f33c1f4
SHA512707dbb73610702b027528a84a1eee3485dcd6105485901a4144e9bf24d682f5eb32edc846db956bac5f4b5858ee044bd7b0c855203d3b2ce9b7afbbebfc46a7d