Analysis
-
max time kernel
122s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19-09-2022 09:35
Static task
static1
Behavioral task
behavioral1
Sample
bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe
Resource
win10v2004-20220812-en
General
-
Target
bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe
-
Size
67KB
-
MD5
b7e5d97a60fec2db9a30bfb46dca307d
-
SHA1
c8d9578aca4a4bb528eb8280ae64df5c4b3408ce
-
SHA256
bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651
-
SHA512
ee98d4c74c1a6384f7b08692958fd6285834ba5693635106da407751af309263924217320138e84363b1747ededa33f97bdb4330824beb19661a20bf8e781f81
-
SSDEEP
1536:nn8YjGFzGwPwTFgc0GKf6xzpGG6vKRgau2Cnd3YehTuXAxUva:nnDjXwPwZFLxzp9u5nZYBAxCa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 980 notepad.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Media Number Service\Parameters\ServiceDll = "C:\\Windows\\system32\\icmu.dll" rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2024 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 2024 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 1680 rundll32.exe 676 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\icmu.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\icmu.dll rundll32.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\notepad.exe bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe File opened for modification C:\Program Files (x86)\Common Files\notepad.exe bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 980 notepad.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2024 wrote to memory of 980 2024 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 27 PID 2024 wrote to memory of 980 2024 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 27 PID 2024 wrote to memory of 980 2024 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 27 PID 2024 wrote to memory of 980 2024 bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe 27 PID 980 wrote to memory of 1680 980 notepad.exe 28 PID 980 wrote to memory of 1680 980 notepad.exe 28 PID 980 wrote to memory of 1680 980 notepad.exe 28 PID 980 wrote to memory of 1680 980 notepad.exe 28 PID 980 wrote to memory of 1680 980 notepad.exe 28 PID 980 wrote to memory of 1680 980 notepad.exe 28 PID 980 wrote to memory of 1680 980 notepad.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe"C:\Users\Admin\AppData\Local\Temp\bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Common Files\notepad.exe"C:\Program Files (x86)\Common Files\notepad.exe" C:\Users\Admin\AppData\Local\Temp\bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651.exe2⤵
- Executes dropped EXE
- Opens file in notepad (likely ransom note)
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\B57.tmp" "8A'+ [=[SCMR'8[='U"3⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:1680
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5b7e5d97a60fec2db9a30bfb46dca307d
SHA1c8d9578aca4a4bb528eb8280ae64df5c4b3408ce
SHA256bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651
SHA512ee98d4c74c1a6384f7b08692958fd6285834ba5693635106da407751af309263924217320138e84363b1747ededa33f97bdb4330824beb19661a20bf8e781f81
-
Filesize
67KB
MD5b7e5d97a60fec2db9a30bfb46dca307d
SHA1c8d9578aca4a4bb528eb8280ae64df5c4b3408ce
SHA256bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651
SHA512ee98d4c74c1a6384f7b08692958fd6285834ba5693635106da407751af309263924217320138e84363b1747ededa33f97bdb4330824beb19661a20bf8e781f81
-
Filesize
98KB
MD5fa691bbacc13fc8e58960ef2d5dbe63e
SHA148f03e288c3891c9e30b3d936074ae4b235b5137
SHA256e9426c7cca5c1726c72a10681b4c272d614788275237e4e90d19ba211932c86f
SHA512d4d6650e39cbd9a699cc7adadd87b40da6e6d750a8576d2b083a244a94392561471f337b2ce492eb3764866f5fe7ded87e4da8cb1c1c6f8685d6a9020f272d34
-
Filesize
98KB
MD5fa691bbacc13fc8e58960ef2d5dbe63e
SHA148f03e288c3891c9e30b3d936074ae4b235b5137
SHA256e9426c7cca5c1726c72a10681b4c272d614788275237e4e90d19ba211932c86f
SHA512d4d6650e39cbd9a699cc7adadd87b40da6e6d750a8576d2b083a244a94392561471f337b2ce492eb3764866f5fe7ded87e4da8cb1c1c6f8685d6a9020f272d34
-
Filesize
67KB
MD5b7e5d97a60fec2db9a30bfb46dca307d
SHA1c8d9578aca4a4bb528eb8280ae64df5c4b3408ce
SHA256bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651
SHA512ee98d4c74c1a6384f7b08692958fd6285834ba5693635106da407751af309263924217320138e84363b1747ededa33f97bdb4330824beb19661a20bf8e781f81
-
Filesize
67KB
MD5b7e5d97a60fec2db9a30bfb46dca307d
SHA1c8d9578aca4a4bb528eb8280ae64df5c4b3408ce
SHA256bdbb692efdb960e8adaae93b2c1c6af6732afab4b5cbdd4ba6c94a9d74129651
SHA512ee98d4c74c1a6384f7b08692958fd6285834ba5693635106da407751af309263924217320138e84363b1747ededa33f97bdb4330824beb19661a20bf8e781f81
-
Filesize
98KB
MD5fa691bbacc13fc8e58960ef2d5dbe63e
SHA148f03e288c3891c9e30b3d936074ae4b235b5137
SHA256e9426c7cca5c1726c72a10681b4c272d614788275237e4e90d19ba211932c86f
SHA512d4d6650e39cbd9a699cc7adadd87b40da6e6d750a8576d2b083a244a94392561471f337b2ce492eb3764866f5fe7ded87e4da8cb1c1c6f8685d6a9020f272d34
-
Filesize
98KB
MD5fa691bbacc13fc8e58960ef2d5dbe63e
SHA148f03e288c3891c9e30b3d936074ae4b235b5137
SHA256e9426c7cca5c1726c72a10681b4c272d614788275237e4e90d19ba211932c86f
SHA512d4d6650e39cbd9a699cc7adadd87b40da6e6d750a8576d2b083a244a94392561471f337b2ce492eb3764866f5fe7ded87e4da8cb1c1c6f8685d6a9020f272d34