Analysis
-
max time kernel
54s -
max time network
72s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2022, 14:53
Static task
static1
Behavioral task
behavioral1
Sample
ac34bbf8e672ec01901fff0404cdc8ef7dd27684cbe17d90ef01d6e96ba09786.exe
Resource
win10-20220901-en
General
-
Target
ac34bbf8e672ec01901fff0404cdc8ef7dd27684cbe17d90ef01d6e96ba09786.exe
-
Size
1.9MB
-
MD5
0883308f67355068da1569e0af6e7447
-
SHA1
1f03d1412371995c35f445774cc56b3d8246807b
-
SHA256
ac34bbf8e672ec01901fff0404cdc8ef7dd27684cbe17d90ef01d6e96ba09786
-
SHA512
0850d0a7254cccdddb0b9599c9ec2b4848d497f844333b56846fbc2cfa89950187ecd6b6118df4af9c26b05166864190a575a09966d5cc8097526c357bc73eb0
-
SSDEEP
49152:EuWx7zgUR5FLI65OzvldjKbD5scUqBHoupKs64u:EuWRLLIYO3Wv5s5q3InJ
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2928 regsvr32.exe 2928 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 520 wrote to memory of 2928 520 ac34bbf8e672ec01901fff0404cdc8ef7dd27684cbe17d90ef01d6e96ba09786.exe 66 PID 520 wrote to memory of 2928 520 ac34bbf8e672ec01901fff0404cdc8ef7dd27684cbe17d90ef01d6e96ba09786.exe 66 PID 520 wrote to memory of 2928 520 ac34bbf8e672ec01901fff0404cdc8ef7dd27684cbe17d90ef01d6e96ba09786.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac34bbf8e672ec01901fff0404cdc8ef7dd27684cbe17d90ef01d6e96ba09786.exe"C:\Users\Admin\AppData\Local\Temp\ac34bbf8e672ec01901fff0404cdc8ef7dd27684cbe17d90ef01d6e96ba09786.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" .\NWT0.K -u /s2⤵
- Loads dropped DLL
PID:2928
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5239641aac7c2401413d4d7475cb83e59
SHA1955bc610fe8fe76f660c0596cbe9791c5dfe5ee1
SHA256cf3dba8a52a217fbdaa2b8cd3aae73bb3abc817fc58031843e7ca7c506a22243
SHA512cb00804f9c4ac8612ea1bce86dc1c57c64789eed06d96109dcf166dbb6dc313b273971056a7d893f6b049ba9b08d98163dc642e551aef8468c36309fb6e0ac5d
-
Filesize
1.7MB
MD5239641aac7c2401413d4d7475cb83e59
SHA1955bc610fe8fe76f660c0596cbe9791c5dfe5ee1
SHA256cf3dba8a52a217fbdaa2b8cd3aae73bb3abc817fc58031843e7ca7c506a22243
SHA512cb00804f9c4ac8612ea1bce86dc1c57c64789eed06d96109dcf166dbb6dc313b273971056a7d893f6b049ba9b08d98163dc642e551aef8468c36309fb6e0ac5d
-
Filesize
1.7MB
MD5239641aac7c2401413d4d7475cb83e59
SHA1955bc610fe8fe76f660c0596cbe9791c5dfe5ee1
SHA256cf3dba8a52a217fbdaa2b8cd3aae73bb3abc817fc58031843e7ca7c506a22243
SHA512cb00804f9c4ac8612ea1bce86dc1c57c64789eed06d96109dcf166dbb6dc313b273971056a7d893f6b049ba9b08d98163dc642e551aef8468c36309fb6e0ac5d