Analysis
-
max time kernel
81s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
05-10-2022 16:02
Static task
static1
Behavioral task
behavioral1
Sample
bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe
Resource
win10-20220901-en
General
-
Target
bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe
-
Size
1.8MB
-
MD5
bccce42c38713556dd1266779eca6877
-
SHA1
3cd3af704e34bce7a2518f4b3223c90bf20d748f
-
SHA256
bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7
-
SHA512
12cec1102d3b9cd6ca69c8b8e9b6215e68b60c47eb67af0bfc6c2bc646aaf233b8e65034f413429df20ac717c45e6499d853fc5b5b1508d062b1722e2a817fe6
-
SSDEEP
49152:pyBNahC3vluQU0QS/1B7krgasZOxtU3kvgWaclVo4T9X8:pyBNL4QU0Q81Zkr/8macfT9M
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1768 rundll32.exe 4908 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1644 wrote to memory of 1348 1644 bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe 67 PID 1644 wrote to memory of 1348 1644 bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe 67 PID 1644 wrote to memory of 1348 1644 bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe 67 PID 1348 wrote to memory of 1768 1348 control.exe 69 PID 1348 wrote to memory of 1768 1348 control.exe 69 PID 1348 wrote to memory of 1768 1348 control.exe 69 PID 1768 wrote to memory of 4560 1768 rundll32.exe 70 PID 1768 wrote to memory of 4560 1768 rundll32.exe 70 PID 4560 wrote to memory of 4908 4560 RunDll32.exe 71 PID 4560 wrote to memory of 4908 4560 RunDll32.exe 71 PID 4560 wrote to memory of 4908 4560 RunDll32.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe"C:\Users\Admin\AppData\Local\Temp\bb294d1e88031c05ed9bcc8224558b9d94f7fb502cc052a804192b8491d707f7.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\w0JCNOH.Cpl",5⤵
- Loads dropped DLL
PID:4908
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5559101ece1ec71b06d5febc568ebe57b
SHA194cdd9f27d49e59f4657b4ceefce194acc9e886a
SHA2569ad69475c23524490b0b89507dfa95fa897ea055f40bf29f26a47147a7efb621
SHA51286dbe774b85a2ed68f734aa32f67018d9e17cf6b2baf7cfe13d773dfcbdc6b3a0e68d1fc462c44af12b4f82f8320f36d205fbd171612ea39069abdf8c087b058
-
Filesize
2.0MB
MD5559101ece1ec71b06d5febc568ebe57b
SHA194cdd9f27d49e59f4657b4ceefce194acc9e886a
SHA2569ad69475c23524490b0b89507dfa95fa897ea055f40bf29f26a47147a7efb621
SHA51286dbe774b85a2ed68f734aa32f67018d9e17cf6b2baf7cfe13d773dfcbdc6b3a0e68d1fc462c44af12b4f82f8320f36d205fbd171612ea39069abdf8c087b058
-
Filesize
2.0MB
MD5559101ece1ec71b06d5febc568ebe57b
SHA194cdd9f27d49e59f4657b4ceefce194acc9e886a
SHA2569ad69475c23524490b0b89507dfa95fa897ea055f40bf29f26a47147a7efb621
SHA51286dbe774b85a2ed68f734aa32f67018d9e17cf6b2baf7cfe13d773dfcbdc6b3a0e68d1fc462c44af12b4f82f8320f36d205fbd171612ea39069abdf8c087b058