Analysis
-
max time kernel
91s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe
Resource
win10v2004-20220812-en
General
-
Target
ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe
-
Size
1.9MB
-
MD5
05be41a9d7db52cda0f3e87d2f35af10
-
SHA1
f6f435c45e1e859447f29763d77916c6e81b4f3e
-
SHA256
ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd
-
SHA512
72c9a38fb415b61a47c4bce65ce226acbc4672bc7fa26464097fe91f50e418c7ef9ec083752455e1978fc59a688b7449c522b73f7da312ebe2f4d4de79c88eda
-
SSDEEP
49152:I/oSqeAryzWTIc99lvfJvK31SqyOxE3zAzLj:I/o4AryCTIc9vfM1SJ30fj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe -
Loads dropped DLL 2 IoCs
pid Process 1824 rundll32.exe 216 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2688 5048 ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe 81 PID 5048 wrote to memory of 2688 5048 ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe 81 PID 5048 wrote to memory of 2688 5048 ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe 81 PID 2688 wrote to memory of 1824 2688 control.exe 83 PID 2688 wrote to memory of 1824 2688 control.exe 83 PID 2688 wrote to memory of 1824 2688 control.exe 83 PID 1824 wrote to memory of 100 1824 rundll32.exe 90 PID 1824 wrote to memory of 100 1824 rundll32.exe 90 PID 100 wrote to memory of 216 100 RunDll32.exe 91 PID 100 wrote to memory of 216 100 RunDll32.exe 91 PID 100 wrote to memory of 216 100 RunDll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe"C:\Users\Admin\AppData\Local\Temp\ee010f0b2d9afa2a1def8e1d899c1e0afb44041545af91d227e6997e852f08cd.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\LL4JAm.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\LL4JAm.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\LL4JAm.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\LL4JAm.cPl",5⤵
- Loads dropped DLL
PID:216
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD5484d7ed949e92183e498ed3afb4ff329
SHA196d14ce25a24a366c8d2a7d04fb56fb585503913
SHA256b26554e0edbf8384bd0e420444bafc925e2503372bc2719a17732160ee77eb20
SHA5129ec28bc61bf1da2687f51f63948a83b68274f8d5efb0a820f34dbe70bf5fbcf13e78932a849b923ef6729e5344e85809f705d6780d54db0f7248e55006355dd1
-
Filesize
2.4MB
MD5484d7ed949e92183e498ed3afb4ff329
SHA196d14ce25a24a366c8d2a7d04fb56fb585503913
SHA256b26554e0edbf8384bd0e420444bafc925e2503372bc2719a17732160ee77eb20
SHA5129ec28bc61bf1da2687f51f63948a83b68274f8d5efb0a820f34dbe70bf5fbcf13e78932a849b923ef6729e5344e85809f705d6780d54db0f7248e55006355dd1
-
Filesize
2.4MB
MD5484d7ed949e92183e498ed3afb4ff329
SHA196d14ce25a24a366c8d2a7d04fb56fb585503913
SHA256b26554e0edbf8384bd0e420444bafc925e2503372bc2719a17732160ee77eb20
SHA5129ec28bc61bf1da2687f51f63948a83b68274f8d5efb0a820f34dbe70bf5fbcf13e78932a849b923ef6729e5344e85809f705d6780d54db0f7248e55006355dd1