Analysis
-
max time kernel
41s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
5c0e2e99945b325030c4042a95c59a8b03f7eecddda476c02e4b6c247ce0e350.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c0e2e99945b325030c4042a95c59a8b03f7eecddda476c02e4b6c247ce0e350.dll
Resource
win10v2004-20220812-en
General
-
Target
5c0e2e99945b325030c4042a95c59a8b03f7eecddda476c02e4b6c247ce0e350.dll
-
Size
212KB
-
MD5
5b55a2c941f3d7e932b06f9ba3e31237
-
SHA1
97d6ed909cfb7dc9884f529e21450f419a4f9497
-
SHA256
5c0e2e99945b325030c4042a95c59a8b03f7eecddda476c02e4b6c247ce0e350
-
SHA512
7872a4063c4d524f90d1b57235ba54abc3e68e25de5d370222941380442e0cd5167e855916693e381a2ef6d11d092c2d390352dfc23e2058705fce6f461a9cd9
-
SSDEEP
3072:7TJztPmNhnIiaDCjqW9DKZr9+Vwxddp+czMoQfW:9xmL1aDMqQDK6CbDaW
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\053e0ec742c6b4e20c674adddcee7f30b8a95c59a2404c030523b54999e2e0c5.pad rundll32.exe File opened for modification C:\PROGRA~3\053e0ec742c6b4e20c674adddcee7f30b8a95c59a2404c030523b54999e2e0c5.pad rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1944 wrote to memory of 536 1944 rundll32.exe 27 PID 1944 wrote to memory of 536 1944 rundll32.exe 27 PID 1944 wrote to memory of 536 1944 rundll32.exe 27 PID 1944 wrote to memory of 536 1944 rundll32.exe 27 PID 1944 wrote to memory of 536 1944 rundll32.exe 27 PID 1944 wrote to memory of 536 1944 rundll32.exe 27 PID 1944 wrote to memory of 536 1944 rundll32.exe 27
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c0e2e99945b325030c4042a95c59a8b03f7eecddda476c02e4b6c247ce0e350.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5c0e2e99945b325030c4042a95c59a8b03f7eecddda476c02e4b6c247ce0e350.dll,#12⤵
- Drops file in Program Files directory
PID:536
-