Analysis

  • max time kernel
    81s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-10-2022 16:02

General

  • Target

    bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe

  • Size

    1.8MB

  • MD5

    bccce42c38713556dd1266779eca6877

  • SHA1

    3cd3af704e34bce7a2518f4b3223c90bf20d748f

  • SHA256

    bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7

  • SHA512

    12cec1102d3b9cd6ca69c8b8e9b6215e68b60c47eb67af0bfc6c2bc646aaf233b8e65034f413429df20ac717c45e6499d853fc5b5b1508d062b1722e2a817fe6

  • SSDEEP

    49152:pyBNahC3vluQU0QS/1B7krgasZOxtU3kvgWaclVo4T9X8:pyBNL4QU0Q81Zkr/8macfT9M

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe
    "C:\Users\Admin\AppData\Local\Temp\bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4560
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl",
            5⤵
            • Loads dropped DLL
            PID:4908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl

    Filesize

    2.0MB

    MD5

    559101ece1ec71b06d5febc568ebe57b

    SHA1

    94cdd9f27d49e59f4657b4ceefce194acc9e886a

    SHA256

    9ad69475c23524490b0b89507dfa95fa897ea055f40bf29f26a47147a7efb621

    SHA512

    86dbe774b85a2ed68f734aa32f67018d9e17cf6b2baf7cfe13d773dfcbdc6b3a0e68d1fc462c44af12b4f82f8320f36d205fbd171612ea39069abdf8c087b058

  • \Users\Admin\AppData\Local\Temp\w0jCNOH.cpl

    Filesize

    2.0MB

    MD5

    559101ece1ec71b06d5febc568ebe57b

    SHA1

    94cdd9f27d49e59f4657b4ceefce194acc9e886a

    SHA256

    9ad69475c23524490b0b89507dfa95fa897ea055f40bf29f26a47147a7efb621

    SHA512

    86dbe774b85a2ed68f734aa32f67018d9e17cf6b2baf7cfe13d773dfcbdc6b3a0e68d1fc462c44af12b4f82f8320f36d205fbd171612ea39069abdf8c087b058

  • \Users\Admin\AppData\Local\Temp\w0jCNOH.cpl

    Filesize

    2.0MB

    MD5

    559101ece1ec71b06d5febc568ebe57b

    SHA1

    94cdd9f27d49e59f4657b4ceefce194acc9e886a

    SHA256

    9ad69475c23524490b0b89507dfa95fa897ea055f40bf29f26a47147a7efb621

    SHA512

    86dbe774b85a2ed68f734aa32f67018d9e17cf6b2baf7cfe13d773dfcbdc6b3a0e68d1fc462c44af12b4f82f8320f36d205fbd171612ea39069abdf8c087b058

  • memory/1644-156-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-163-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-122-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-123-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-125-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-158-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-128-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-129-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-130-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-131-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-132-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-133-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-134-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-136-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-135-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-137-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-139-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-138-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-140-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-141-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-142-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-143-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-144-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-145-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-146-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-147-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-148-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-149-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-150-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-151-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-152-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-153-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-154-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-155-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-120-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-157-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-126-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-159-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-121-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-161-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-162-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-160-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-164-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-165-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-166-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-167-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-168-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-169-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-170-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-172-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-173-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-174-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-171-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-175-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-176-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-177-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-178-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-179-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-180-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-181-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-182-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-183-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-184-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1644-185-0x0000000077AA0000-0x0000000077C2E000-memory.dmp

    Filesize

    1.6MB

  • memory/1768-280-0x0000000004F00000-0x000000000506E000-memory.dmp

    Filesize

    1.4MB

  • memory/1768-281-0x00000000051A0000-0x00000000052CD000-memory.dmp

    Filesize

    1.2MB

  • memory/1768-350-0x00000000051A0000-0x00000000052CD000-memory.dmp

    Filesize

    1.2MB

  • memory/4908-339-0x0000000004C70000-0x0000000004DDE000-memory.dmp

    Filesize

    1.4MB

  • memory/4908-340-0x0000000004F10000-0x000000000503D000-memory.dmp

    Filesize

    1.2MB

  • memory/4908-349-0x0000000004F10000-0x000000000503D000-memory.dmp

    Filesize

    1.2MB