Analysis
-
max time kernel
50s -
max time network
71s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
22-09-2022 16:01
Static task
static1
Behavioral task
behavioral1
Sample
e5c791dd6fc81e3cb076995ec65362a8c5e7333586c935ac1a8c3666749c1978.exe
Resource
win10-20220901-en
General
-
Target
e5c791dd6fc81e3cb076995ec65362a8c5e7333586c935ac1a8c3666749c1978.exe
-
Size
1.7MB
-
MD5
6faf8c6a5daf175a6742e4cac9251a71
-
SHA1
b6e35144266f79e6667d337712350927aa4a80f2
-
SHA256
e5c791dd6fc81e3cb076995ec65362a8c5e7333586c935ac1a8c3666749c1978
-
SHA512
c84fc8a41da04ece2f026816eafa43f9dff4e034e3b3c75e9f5e9ad5a762a58bf4600a542a0763b3981167231b19dd3d195dd8aa5a52d8de8a0995492a396b49
-
SSDEEP
49152:UbA30XXQc7JEKbh8zlhgGzIYIed2Q6I4u8q:UbUcy88zleGsYEQ6I4u8q
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3516 rundll32.exe 3516 rundll32.exe 4508 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2924 2172 e5c791dd6fc81e3cb076995ec65362a8c5e7333586c935ac1a8c3666749c1978.exe 66 PID 2172 wrote to memory of 2924 2172 e5c791dd6fc81e3cb076995ec65362a8c5e7333586c935ac1a8c3666749c1978.exe 66 PID 2172 wrote to memory of 2924 2172 e5c791dd6fc81e3cb076995ec65362a8c5e7333586c935ac1a8c3666749c1978.exe 66 PID 2924 wrote to memory of 3516 2924 control.exe 67 PID 2924 wrote to memory of 3516 2924 control.exe 67 PID 2924 wrote to memory of 3516 2924 control.exe 67 PID 3516 wrote to memory of 3908 3516 rundll32.exe 68 PID 3516 wrote to memory of 3908 3516 rundll32.exe 68 PID 3908 wrote to memory of 4508 3908 RunDll32.exe 69 PID 3908 wrote to memory of 4508 3908 RunDll32.exe 69 PID 3908 wrote to memory of 4508 3908 RunDll32.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5c791dd6fc81e3cb076995ec65362a8c5e7333586c935ac1a8c3666749c1978.exe"C:\Users\Admin\AppData\Local\Temp\e5c791dd6fc81e3cb076995ec65362a8c5e7333586c935ac1a8c3666749c1978.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\QNfXgBT.NzN2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\QNfXgBT.NzN3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\QNfXgBT.NzN4⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\QNfXgBT.NzN5⤵
- Loads dropped DLL
PID:4508
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5d66fc424fb4b5b0cd08942d0dc8ca205
SHA165848d89b10e7cc60d74185275dfd23e374fcf6c
SHA256c488bae327882209d66e93d58bf7ac113f45798fb66012e494db9375bb0de1e0
SHA5127aae14d7d7ff38a8b366bb25d247df4803e1bb92f1440beb2d3bdf91f36069263c51be58ad7656fc2b101918dc7020bfb0e918b4b61776d9cf68b210651e2bb4
-
Filesize
1.9MB
MD5d66fc424fb4b5b0cd08942d0dc8ca205
SHA165848d89b10e7cc60d74185275dfd23e374fcf6c
SHA256c488bae327882209d66e93d58bf7ac113f45798fb66012e494db9375bb0de1e0
SHA5127aae14d7d7ff38a8b366bb25d247df4803e1bb92f1440beb2d3bdf91f36069263c51be58ad7656fc2b101918dc7020bfb0e918b4b61776d9cf68b210651e2bb4
-
Filesize
1.9MB
MD5d66fc424fb4b5b0cd08942d0dc8ca205
SHA165848d89b10e7cc60d74185275dfd23e374fcf6c
SHA256c488bae327882209d66e93d58bf7ac113f45798fb66012e494db9375bb0de1e0
SHA5127aae14d7d7ff38a8b366bb25d247df4803e1bb92f1440beb2d3bdf91f36069263c51be58ad7656fc2b101918dc7020bfb0e918b4b61776d9cf68b210651e2bb4
-
Filesize
1.9MB
MD5d66fc424fb4b5b0cd08942d0dc8ca205
SHA165848d89b10e7cc60d74185275dfd23e374fcf6c
SHA256c488bae327882209d66e93d58bf7ac113f45798fb66012e494db9375bb0de1e0
SHA5127aae14d7d7ff38a8b366bb25d247df4803e1bb92f1440beb2d3bdf91f36069263c51be58ad7656fc2b101918dc7020bfb0e918b4b61776d9cf68b210651e2bb4