Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe
Resource
win10v2004-20220812-en
General
-
Target
cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe
-
Size
144KB
-
MD5
0a87abafc0d532f15ddb91ea04849771
-
SHA1
d1468975d59f7aba47f79ebf36f9412e885f3435
-
SHA256
cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5
-
SHA512
0c367bae391b293aa640a00c489e93679fd0fbd897ff0a9f44f55d70a6b9cc0f5d18f23da4b8312f7f5677d954e4117dbee05be155125a62954c0250eb1b5e84
-
SSDEEP
3072:DQIURTXJ+MYK/YuOn4PDjYngd8BaPlDXiVzJrWQ9:Ds9Hsng0ngg27szJr3
Malware Config
Signatures
-
Loads dropped DLL 6 IoCs
pid Process 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 820 rundll32.exe 1216 WerFault.exe 1216 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1216 820 WerFault.exe 26 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 820 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1364 wrote to memory of 820 1364 cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe 26 PID 1364 wrote to memory of 820 1364 cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe 26 PID 1364 wrote to memory of 820 1364 cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe 26 PID 1364 wrote to memory of 820 1364 cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe 26 PID 1364 wrote to memory of 820 1364 cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe 26 PID 1364 wrote to memory of 820 1364 cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe 26 PID 1364 wrote to memory of 820 1364 cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe 26 PID 820 wrote to memory of 1216 820 rundll32.exe 27 PID 820 wrote to memory of 1216 820 rundll32.exe 27 PID 820 wrote to memory of 1216 820 rundll32.exe 27 PID 820 wrote to memory of 1216 820 rundll32.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe"C:\Users\Admin\AppData\Local\Temp\cd4c2fd62fc59152c089d29cc24f214b3cad8dced2bd14e3c1df7e53e9ef47c5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\nsd316F.tmp\nvhgybhf.dll",CoDeviceInstall2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 2843⤵
- Loads dropped DLL
- Program crash
PID:1216
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD57f80e17c61e61131272d0f8da1691bcd
SHA1bc62d7a7763a7c8c179caaf893276c33033b2fce
SHA256a9d3a51bc7459e9e8e8dadf0daeb6cad8889371ef89cfd31ed72c1d56010c77f
SHA51255c792f6e700932b068d4a76e91029f7a9c924982dc78acd8d4e44a84ad47d5562ecc8056be91385c173203f773c239d51ae817381a8ffadcc5dec9fdeb84187
-
Filesize
300KB
MD57f80e17c61e61131272d0f8da1691bcd
SHA1bc62d7a7763a7c8c179caaf893276c33033b2fce
SHA256a9d3a51bc7459e9e8e8dadf0daeb6cad8889371ef89cfd31ed72c1d56010c77f
SHA51255c792f6e700932b068d4a76e91029f7a9c924982dc78acd8d4e44a84ad47d5562ecc8056be91385c173203f773c239d51ae817381a8ffadcc5dec9fdeb84187
-
Filesize
300KB
MD57f80e17c61e61131272d0f8da1691bcd
SHA1bc62d7a7763a7c8c179caaf893276c33033b2fce
SHA256a9d3a51bc7459e9e8e8dadf0daeb6cad8889371ef89cfd31ed72c1d56010c77f
SHA51255c792f6e700932b068d4a76e91029f7a9c924982dc78acd8d4e44a84ad47d5562ecc8056be91385c173203f773c239d51ae817381a8ffadcc5dec9fdeb84187
-
Filesize
300KB
MD57f80e17c61e61131272d0f8da1691bcd
SHA1bc62d7a7763a7c8c179caaf893276c33033b2fce
SHA256a9d3a51bc7459e9e8e8dadf0daeb6cad8889371ef89cfd31ed72c1d56010c77f
SHA51255c792f6e700932b068d4a76e91029f7a9c924982dc78acd8d4e44a84ad47d5562ecc8056be91385c173203f773c239d51ae817381a8ffadcc5dec9fdeb84187
-
Filesize
300KB
MD57f80e17c61e61131272d0f8da1691bcd
SHA1bc62d7a7763a7c8c179caaf893276c33033b2fce
SHA256a9d3a51bc7459e9e8e8dadf0daeb6cad8889371ef89cfd31ed72c1d56010c77f
SHA51255c792f6e700932b068d4a76e91029f7a9c924982dc78acd8d4e44a84ad47d5562ecc8056be91385c173203f773c239d51ae817381a8ffadcc5dec9fdeb84187
-
Filesize
300KB
MD57f80e17c61e61131272d0f8da1691bcd
SHA1bc62d7a7763a7c8c179caaf893276c33033b2fce
SHA256a9d3a51bc7459e9e8e8dadf0daeb6cad8889371ef89cfd31ed72c1d56010c77f
SHA51255c792f6e700932b068d4a76e91029f7a9c924982dc78acd8d4e44a84ad47d5562ecc8056be91385c173203f773c239d51ae817381a8ffadcc5dec9fdeb84187
-
Filesize
300KB
MD57f80e17c61e61131272d0f8da1691bcd
SHA1bc62d7a7763a7c8c179caaf893276c33033b2fce
SHA256a9d3a51bc7459e9e8e8dadf0daeb6cad8889371ef89cfd31ed72c1d56010c77f
SHA51255c792f6e700932b068d4a76e91029f7a9c924982dc78acd8d4e44a84ad47d5562ecc8056be91385c173203f773c239d51ae817381a8ffadcc5dec9fdeb84187