Analysis
-
max time kernel
60s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2022 11:26
Static task
static1
Behavioral task
behavioral1
Sample
f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe
Resource
win10v2004-20220812-en
General
-
Target
f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe
-
Size
1.5MB
-
MD5
68beaf63fe9a210916ed13ed860400aa
-
SHA1
2f58ab61157dda094e8d42ae7c7363d9568f97b2
-
SHA256
f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92
-
SHA512
8ee7217488ee18323031298abc101746434f175d7f825a691664d3de8f524cc4845bff44a009a8635b17a431684a2b5356d38e64908f01a20bdc2229680cc4f4
-
SSDEEP
24576:dHLmCiIhSXzLwTbF29ZdYP4NLdJncUyp05hK/shb8Ef+jNyE2IRy9DxvyCY:WnLwTRZP4NLdJe0q1occlVK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe -
Loads dropped DLL 4 IoCs
pid Process 4756 rundll32.exe 4756 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5048 wrote to memory of 2180 5048 f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe 81 PID 5048 wrote to memory of 2180 5048 f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe 81 PID 5048 wrote to memory of 2180 5048 f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe 81 PID 2180 wrote to memory of 4756 2180 control.exe 83 PID 2180 wrote to memory of 4756 2180 control.exe 83 PID 2180 wrote to memory of 4756 2180 control.exe 83 PID 4756 wrote to memory of 204 4756 rundll32.exe 90 PID 4756 wrote to memory of 204 4756 rundll32.exe 90 PID 204 wrote to memory of 4012 204 RunDll32.exe 91 PID 204 wrote to memory of 4012 204 RunDll32.exe 91 PID 204 wrote to memory of 4012 204 RunDll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe"C:\Users\Admin\AppData\Local\Temp\f288f18ff15512f592e29166c26f3d2d4ea00e89eb59b65411b7338355117b92.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Ab~3ZkZ.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Ab~3ZkZ.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Ab~3ZkZ.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Ab~3ZkZ.CPl",5⤵
- Loads dropped DLL
PID:4012
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5c9fd00b9bca505c019882b0547bda901
SHA1482d0cef02eafde1d15ed8524ad906f9b7fba4c8
SHA2565c1231fd5f1db3fcdd0215ef35cf8e5f152eb03891f27f8ffac4a8e261f8a958
SHA512e3402dc4cc6f916e26cf7745b711a9592eae0e8c5cb0eb8bdc1dafc42f97ea95c5d74b9bc18c9ff922e61e4f9e107e73456406aee82b464e8bf6c5d0c0b8e0e4
-
Filesize
1.5MB
MD5c9fd00b9bca505c019882b0547bda901
SHA1482d0cef02eafde1d15ed8524ad906f9b7fba4c8
SHA2565c1231fd5f1db3fcdd0215ef35cf8e5f152eb03891f27f8ffac4a8e261f8a958
SHA512e3402dc4cc6f916e26cf7745b711a9592eae0e8c5cb0eb8bdc1dafc42f97ea95c5d74b9bc18c9ff922e61e4f9e107e73456406aee82b464e8bf6c5d0c0b8e0e4
-
Filesize
1.5MB
MD5c9fd00b9bca505c019882b0547bda901
SHA1482d0cef02eafde1d15ed8524ad906f9b7fba4c8
SHA2565c1231fd5f1db3fcdd0215ef35cf8e5f152eb03891f27f8ffac4a8e261f8a958
SHA512e3402dc4cc6f916e26cf7745b711a9592eae0e8c5cb0eb8bdc1dafc42f97ea95c5d74b9bc18c9ff922e61e4f9e107e73456406aee82b464e8bf6c5d0c0b8e0e4
-
Filesize
1.5MB
MD5c9fd00b9bca505c019882b0547bda901
SHA1482d0cef02eafde1d15ed8524ad906f9b7fba4c8
SHA2565c1231fd5f1db3fcdd0215ef35cf8e5f152eb03891f27f8ffac4a8e261f8a958
SHA512e3402dc4cc6f916e26cf7745b711a9592eae0e8c5cb0eb8bdc1dafc42f97ea95c5d74b9bc18c9ff922e61e4f9e107e73456406aee82b464e8bf6c5d0c0b8e0e4
-
Filesize
1.5MB
MD5c9fd00b9bca505c019882b0547bda901
SHA1482d0cef02eafde1d15ed8524ad906f9b7fba4c8
SHA2565c1231fd5f1db3fcdd0215ef35cf8e5f152eb03891f27f8ffac4a8e261f8a958
SHA512e3402dc4cc6f916e26cf7745b711a9592eae0e8c5cb0eb8bdc1dafc42f97ea95c5d74b9bc18c9ff922e61e4f9e107e73456406aee82b464e8bf6c5d0c0b8e0e4