Analysis

  • max time kernel
    139s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 13:29

General

  • Target

    cf98b9879fcd21e2ad410cf69e0c99f4a4b4f528d0b05616db310baa86d6b910.dll

  • Size

    315KB

  • MD5

    4339bd3eb67169e25a00e60e2cd9688a

  • SHA1

    0653dcbde82af191fe167cdafd6451540ded030a

  • SHA256

    cf98b9879fcd21e2ad410cf69e0c99f4a4b4f528d0b05616db310baa86d6b910

  • SHA512

    5ba5e814ac3d1a14e9fdf2d7407b0d0910ec573ce8e53d0611d3434805b9020b3bdfac447bd5a763b232a956f7a083a5bc424c2aed0666ef93ed78488d500cbd

  • SSDEEP

    6144:1YQ56eIuMzkkkkckkkkbkkkhkkWkzIDvsssssssr:1YQ56DuMzkkkkckkkkbkkkhkkWJvsssv

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\cf98b9879fcd21e2ad410cf69e0c99f4a4b4f528d0b05616db310baa86d6b910.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\cf98b9879fcd21e2ad410cf69e0c99f4a4b4f528d0b05616db310baa86d6b910.dll,#1
      2⤵
      • Drops file in Program Files directory
      PID:4344

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4344-133-0x0000000010000000-0x00000000100B2000-memory.dmp

          Filesize

          712KB