Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2022 07:08
Static task
static1
Behavioral task
behavioral1
Sample
0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe
Resource
win10v2004-20220721-en
General
-
Target
0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe
-
Size
2.3MB
-
MD5
59d567558c6542a7602d9d67fb9b753b
-
SHA1
d71501e35ccac4e72a60f128096112c8d1941d4f
-
SHA256
0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627
-
SHA512
ff7e98258656fd545ac751747c54f8dce539f14a1c85290624e0b30f3a9bb25aea17a1933e6654742e1bd4d53549f3b1c8dab321571ca8f62dd42a7517f24144
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Control Panel\International\Geo\Nation 0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exepid process 4168 rundll32.exe 4168 rundll32.exe 1232 rundll32.exe 1232 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000_Classes\Local Settings 0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 2272 wrote to memory of 2984 2272 0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe control.exe PID 2272 wrote to memory of 2984 2272 0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe control.exe PID 2272 wrote to memory of 2984 2272 0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe control.exe PID 2984 wrote to memory of 4168 2984 control.exe rundll32.exe PID 2984 wrote to memory of 4168 2984 control.exe rundll32.exe PID 2984 wrote to memory of 4168 2984 control.exe rundll32.exe PID 4168 wrote to memory of 5020 4168 rundll32.exe RunDll32.exe PID 4168 wrote to memory of 5020 4168 rundll32.exe RunDll32.exe PID 5020 wrote to memory of 1232 5020 RunDll32.exe rundll32.exe PID 5020 wrote to memory of 1232 5020 RunDll32.exe rundll32.exe PID 5020 wrote to memory of 1232 5020 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe"C:\Users\Admin\AppData\Local\Temp\0ba5533f3ff75a681c3465af7cb0ea41e64d30bc20543c6a1abed8722274e627.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\27Yv2.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\27Yv2.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\27Yv2.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\27Yv2.CPL",5⤵
- Loads dropped DLL
PID:1232
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
678.6MB
MD58b9c2187a2968b9561d27fb74910b980
SHA18616600d3615d6a7caf7c5f4576be2113cf5a3c8
SHA256747b11dd4202fa481d2cc0db9e8362ce2cc141252d89d3275cfadcf1dbea63e1
SHA5124538cd83df9db610bc45a89703b7592487024281973e7f161e9b1d09f73eceadc690aa21e1f71c0cf0529004506b4891dff068c95bee2e429853e426ea1d6519
-
Filesize
636.9MB
MD589f11de1fa1e18049bf259a237e7f583
SHA1874b06a0802ff335bbd72b9a9e7859bf2307c491
SHA256be27e17bde327c69c93b85fb32e513ac7cf50cea3d99b3c649c1bbd93c44c244
SHA512d50c36a3e57116ed0a8e195fb5cb10a629254ee324b6daf61c8c388dffa0b32464180654584bdca498dda3d14f76754cb12d16352c7d35cf742bbc4fe976408c
-
Filesize
682.1MB
MD5ce3f76ce9d4bac0fea894f7ec2a0257c
SHA1fe75507a895bd2208238be75de881868af5c7c0c
SHA2566b041c9e142ea358b724d619f8e3a528107997378741bcc41700c35ca96a4488
SHA512bac86e3a65d130dd0585a2e66241d4e8e91c4f81499c5ca2c0ec7a2b1aa1ba267137c25e62d44da0c921a76895e9d76506e6df71cdfd898f4c1d937769c2a97d
-
Filesize
252.6MB
MD5582273675615bbb5802fcbf39d7b2c9d
SHA156c3a75b716ea3d5cd0ca0eee602aa92e2997668
SHA256804584da0c432f5e7a89072cad0114ad182fddfd20a3e516540dc111583063aa
SHA512fd72a0243aabc177dd2eab62f52d54e2ca804000d3f1e91c1ba60b7d739a4e9b284684da871e233eb7bda3633dbeafef03dd298181bde1a1fa6fbd52c29a3366
-
Filesize
188.2MB
MD571919514e99e625136ba70fb38d3550f
SHA15a5128344428fa68f03b61ddc6f22b2bece890c0
SHA2569757d4fd9d13c7835875f19a27b8b9ae1cfa605aa392c4a9c93a392a62a12a9f
SHA512ce6aa7e69a32d601f8f151226fe6877b55e7959f8e5442f9f6eb9c53e8d3961fa9034ae492796fd0639acb36d19508fb0d0551ce39e1fb15e1498763f15bbf85