Analysis
-
max time kernel
140s -
max time network
181s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 05:22
Static task
static1
Behavioral task
behavioral1
Sample
6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe
Resource
win10v2004-20220414-en
General
-
Target
6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe
-
Size
468KB
-
MD5
35d60d2723c649c97b414b3cb701df1c
-
SHA1
9944ce9354fb8961826339770ffc118000058271
-
SHA256
6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab
-
SHA512
7b010b8dd4845bcfbfef66848fa0a29b987734a7adb41f07bbc025527ee33459edac7674f954016e96c3704e0ed9130104c5cf4625b78927a19c727812ca389c
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid Process 9 908 rundll32.exe 15 908 rundll32.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1640 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exerundll32.exepid Process 1536 regsvr32.exe 908 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exeregsvr32.exedescription pid Process procid_target PID 1728 wrote to memory of 1640 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 28 PID 1728 wrote to memory of 1640 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 28 PID 1728 wrote to memory of 1640 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 28 PID 1728 wrote to memory of 1640 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 28 PID 1728 wrote to memory of 1536 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 30 PID 1728 wrote to memory of 1536 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 30 PID 1728 wrote to memory of 1536 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 30 PID 1728 wrote to memory of 1536 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 30 PID 1728 wrote to memory of 1536 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 30 PID 1728 wrote to memory of 1536 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 30 PID 1728 wrote to memory of 1536 1728 6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe 30 PID 1536 wrote to memory of 908 1536 regsvr32.exe 31 PID 1536 wrote to memory of 908 1536 regsvr32.exe 31 PID 1536 wrote to memory of 908 1536 regsvr32.exe 31 PID 1536 wrote to memory of 908 1536 regsvr32.exe 31 PID 1536 wrote to memory of 908 1536 regsvr32.exe 31 PID 1536 wrote to memory of 908 1536 regsvr32.exe 31 PID 1536 wrote to memory of 908 1536 regsvr32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe"C:\Users\Admin\AppData\Local\Temp\6dfce07abc39e5d6aebd74a1850ad65cc6ce10a8540b551c4f6d441ec4cf48ab.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\rns.bat" "2⤵
- Deletes itself
PID:1640
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /n /i NewACt.dat2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe "C:\Users\Admin\AppData\Roaming\Microsoft\NewACt.dat",checkdrive3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:908
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296B
MD55fea73ccfab1fec3832408ad4c33f786
SHA1c4aeedbf9ce66565e74d3806ad3c76282ed83fb1
SHA2569820d84bdfde1dd8f12ec2306fdeb9089724abd7b9d4b1a0f9f26d4e41b13422
SHA5129af2b2979beb22bd417861bc56fc4eb86635a63e93cb74437ebb7450e90b4b8c814a8ac9ccfc9cf967cafb83867a9fd7353ba5b02dedddf03ce10a5e48c1fed4
-
Filesize
109KB
MD5e54b370d96ca0e2ecc083c2d42f05210
SHA103c35e4c6a641373db665e7d58cea421188fbc82
SHA2561050935f6acee3afda3876478718632b968c986eb9c59fc2e27599c1515515f5
SHA512dbdd30cd32160d716578e325a32db6822227271082ffd78daf0d9d4dad3c04445fe5a10b726bf4bb71d88382e56041ff326132c748a8139e4932e1103734e2d4
-
Filesize
109KB
MD5e54b370d96ca0e2ecc083c2d42f05210
SHA103c35e4c6a641373db665e7d58cea421188fbc82
SHA2561050935f6acee3afda3876478718632b968c986eb9c59fc2e27599c1515515f5
SHA512dbdd30cd32160d716578e325a32db6822227271082ffd78daf0d9d4dad3c04445fe5a10b726bf4bb71d88382e56041ff326132c748a8139e4932e1103734e2d4
-
Filesize
109KB
MD5e54b370d96ca0e2ecc083c2d42f05210
SHA103c35e4c6a641373db665e7d58cea421188fbc82
SHA2561050935f6acee3afda3876478718632b968c986eb9c59fc2e27599c1515515f5
SHA512dbdd30cd32160d716578e325a32db6822227271082ffd78daf0d9d4dad3c04445fe5a10b726bf4bb71d88382e56041ff326132c748a8139e4932e1103734e2d4