Analysis
-
max time kernel
171s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
241b9c7426df548d406b611d6bbc5ac5705db2314a2f7d12ae922081be15a868.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
241b9c7426df548d406b611d6bbc5ac5705db2314a2f7d12ae922081be15a868.dll
Resource
win10v2004-20220812-en
General
-
Target
241b9c7426df548d406b611d6bbc5ac5705db2314a2f7d12ae922081be15a868.dll
-
Size
152KB
-
MD5
357001f891abed68128317611aeccdf2
-
SHA1
21c0f644342eac0b8d05b10bc965b0f72603318a
-
SHA256
241b9c7426df548d406b611d6bbc5ac5705db2314a2f7d12ae922081be15a868
-
SHA512
05b30beed2a2bb78e731e82b754ec075e16e10440decd5ba7197464a1795e101b592e4d9be6bf8261b01105f40f04b9e8dcd0e09fa702b0262edaa9dca42cde4
-
SSDEEP
3072:+EgcnyjOwx2T0x8s1rJZNseTX6NwoFgWClXxM4:1zGF00isnoeWm0C5l
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 19 3236 rundll32.exe 23 3236 rundll32.exe 39 3236 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Winmgmt\Parameters\ServiceDll = "C:\\PROGRA~3\\hwl9gfg.pzz" regedit.exe -
Loads dropped DLL 1 IoCs
pid Process 3236 rundll32.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\PROGRA~3\gfg9lwh.plz rundll32.exe File created C:\PROGRA~3\hwl9gfg.pff rundll32.exe File opened for modification C:\PROGRA~3\hwl9gfg.pff rundll32.exe File created C:\PROGRA~3\hwl9gfg.ctrl rundll32.exe File created C:\PROGRA~3\hwl9gfg.reg rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "174" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Runs .reg file with regedit 1 IoCs
pid Process 760 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe 3236 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3236 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1660 LogonUI.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4372 wrote to memory of 3544 4372 rundll32.exe 81 PID 4372 wrote to memory of 3544 4372 rundll32.exe 81 PID 4372 wrote to memory of 3544 4372 rundll32.exe 81 PID 3544 wrote to memory of 3236 3544 rundll32.exe 83 PID 3544 wrote to memory of 3236 3544 rundll32.exe 83 PID 3544 wrote to memory of 3236 3544 rundll32.exe 83 PID 3236 wrote to memory of 760 3236 rundll32.exe 87 PID 3236 wrote to memory of 760 3236 rundll32.exe 87 PID 3236 wrote to memory of 760 3236 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\241b9c7426df548d406b611d6bbc5ac5705db2314a2f7d12ae922081be15a868.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\241b9c7426df548d406b611d6bbc5ac5705db2314a2f7d12ae922081be15a868.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\PROGRA~3\gfg9lwh.plz,GL3003⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe -s C:\PROGRA~3\hwl9gfg.reg4⤵
- Sets DLL path for service in the registry
- Runs .reg file with regedit
PID:760
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39db055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5357001f891abed68128317611aeccdf2
SHA121c0f644342eac0b8d05b10bc965b0f72603318a
SHA256241b9c7426df548d406b611d6bbc5ac5705db2314a2f7d12ae922081be15a868
SHA51205b30beed2a2bb78e731e82b754ec075e16e10440decd5ba7197464a1795e101b592e4d9be6bf8261b01105f40f04b9e8dcd0e09fa702b0262edaa9dca42cde4
-
Filesize
152KB
MD5357001f891abed68128317611aeccdf2
SHA121c0f644342eac0b8d05b10bc965b0f72603318a
SHA256241b9c7426df548d406b611d6bbc5ac5705db2314a2f7d12ae922081be15a868
SHA51205b30beed2a2bb78e731e82b754ec075e16e10440decd5ba7197464a1795e101b592e4d9be6bf8261b01105f40f04b9e8dcd0e09fa702b0262edaa9dca42cde4
-
Filesize
279B
MD5ac21ce32a04e8577c2befe9fe2c20009
SHA12623d8954f8b4846fee32eefb72fe72c6fd37c82
SHA256e6609d5b141d4701411a60747d9a2894ebbc7a0d2e4c9b7173302651825fdf69
SHA5124214362d034119b955426b27e34911835e9e6c12a6ae10d1da666a4e3f5e41e97d8bbd04ca61d4070fa6e33b4476e41b7360f4483ffc01b853e7458605558677