Analysis
-
max time kernel
61s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20220718-en -
resource tags
arch:x64arch:x86image:win10v2004-20220718-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2022 18:32
Static task
static1
Behavioral task
behavioral1
Sample
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe
Resource
win10v2004-20220718-en
General
-
Target
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe
-
Size
255KB
-
MD5
f69d0c44228292018482c40f6f7fb235
-
SHA1
bd7e27f6fdd7000c1ae16040b44755b5705ee6f0
-
SHA256
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6
-
SHA512
c0a04574479861421b260a5a2078022dc9b8aa2aa58538f95bd48f25856d769f32799f45884c52a036e207f243e835d621e3474649c1706df14fc39995737d72
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exepid process 3232 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe 3232 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe 3232 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe -
Drops file in Windows directory 1 IoCs
Processes:
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exedescription ioc process File opened for modification C:\Windows\win.ini 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4836 3232 WerFault.exe 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe -
Modifies registry class 5 IoCs
Processes:
4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B} 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32\ThreadingModel = "Apartment" 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{275D3BCC-22BB-4948-A7F6-3A3054EBA92B}\InprocServer32 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe"C:\Users\Admin\AppData\Local\Temp\4e2932dafc7c9a9a7665939ad97252d3d1d16497cfa9852dabba4e59c6ca12d6.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 10122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3232 -ip 32321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\deceased.dllFilesize
24KB
MD54739ba192a560d12b81e915e1620d51f
SHA175fc507eab36a4232fca404b9f2451d3b2731432
SHA25614210af8f444ed393be2b22edc2eb9c74188f095c920b4f303db585934bceade
SHA512a8ab3190ea15f5e2fd9c53bcb261b88473a14c02f3a4cb37d1e99a431deafa7555e332a78a8d932f098c7453fc41bf66a6dde16c22bbf89591c9b2b91b5cfc21
-
C:\Users\Admin\AppData\Local\Temp\nslD7B8.tmp\System.dllFilesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
C:\Users\Admin\AppData\Local\Temp\nslD7B8.tmp\UserInfo.dllFilesize
4KB
MD57836f464ae0102452e94a363b491b759
SHA159909a48448b99e2eb9cd336d81d60764da59f31
SHA25611adf8916947b5a20a071b494fa034cf62769dcc6293a1340b29a5bb29ac8e87
SHA5125ed63eefa1b3b3caad4cb762ccb8419c05bcad3da3a7415235cda2d2a1f79eb018503ca30a0a92d6b72160327decea9a70c48e0c28de94dd67303d4aea4a02db
-
memory/3232-133-0x0000000003130000-0x0000000003138000-memory.dmpFilesize
32KB
-
memory/3232-139-0x0000000003250000-0x0000000003259000-memory.dmpFilesize
36KB