Analysis

  • max time kernel
    13s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/10/2022, 13:29

General

  • Target

    cf98b9879fcd21e2ad410cf69e0c99f4a4b4f528d0b05616db310baa86d6b910.dll

  • Size

    315KB

  • MD5

    4339bd3eb67169e25a00e60e2cd9688a

  • SHA1

    0653dcbde82af191fe167cdafd6451540ded030a

  • SHA256

    cf98b9879fcd21e2ad410cf69e0c99f4a4b4f528d0b05616db310baa86d6b910

  • SHA512

    5ba5e814ac3d1a14e9fdf2d7407b0d0910ec573ce8e53d0611d3434805b9020b3bdfac447bd5a763b232a956f7a083a5bc424c2aed0666ef93ed78488d500cbd

  • SSDEEP

    6144:1YQ56eIuMzkkkkckkkkbkkkhkkWkzIDvsssssssr:1YQ56DuMzkkkkckkkkbkkkhkkWJvsssv

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cf98b9879fcd21e2ad410cf69e0c99f4a4b4f528d0b05616db310baa86d6b910.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cf98b9879fcd21e2ad410cf69e0c99f4a4b4f528d0b05616db310baa86d6b910.dll,#1
      2⤵
      • Drops file in Program Files directory
      PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2000-55-0x00000000763F1000-0x00000000763F3000-memory.dmp

    Filesize

    8KB

  • memory/2000-56-0x0000000010000000-0x00000000100B2000-memory.dmp

    Filesize

    712KB