Analysis
-
max time kernel
180s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 12:07
Static task
static1
Behavioral task
behavioral1
Sample
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe
Resource
win10v2004-20220812-en
General
-
Target
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe
-
Size
37KB
-
MD5
655b6d547342a221ad72dbc2f37a5f67
-
SHA1
047542028e5babbd74005d356ab1730502f1cb55
-
SHA256
49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408
-
SHA512
ee58eead75a80fd1655cf40f6b8ed55ca3fd98f9e08f2bb706c5914a6b1a61ba3673e3c4ac77c2bf06e18297515f2c1819ce20fbfbbabfbe34cd6cb462df9207
-
SSDEEP
768:jpuxbbb93pfzxWt7QYQ8IgDidhHPjAJYvHF0lwY437avXKrnrV:j0Rbb5WRQYt9ir/2wram
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 Destination IP 50.7.247.251 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1480 set thread context of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\0E7j2JL.exe 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe File created C:\Windows\Fonts\0E7j2JL.exe 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4796 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 4796 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1480 wrote to memory of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81 PID 1480 wrote to memory of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81 PID 1480 wrote to memory of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81 PID 1480 wrote to memory of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81 PID 1480 wrote to memory of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81 PID 1480 wrote to memory of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81 PID 1480 wrote to memory of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81 PID 1480 wrote to memory of 4796 1480 49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe"C:\Users\Admin\AppData\Local\Temp\49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exeC:\Users\Admin\AppData\Local\Temp\49be22222c4a90a165848ab0da5963d19f3890d035dd2f09f556b62c88641408.exe2⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4796
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3952