Analysis
-
max time kernel
52s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2022, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
c3743a8c944f5c9b17528418bf49b153b978946838f56e5fca0a3f6914bee887.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3743a8c944f5c9b17528418bf49b153b978946838f56e5fca0a3f6914bee887.dll
Resource
win10v2004-20220812-en
General
-
Target
c3743a8c944f5c9b17528418bf49b153b978946838f56e5fca0a3f6914bee887.dll
-
Size
514KB
-
MD5
4f3916e7714f2a32402c9d0b328a2c91
-
SHA1
1dcd85f7364ea06cd595a86e3e9be48995d596e9
-
SHA256
c3743a8c944f5c9b17528418bf49b153b978946838f56e5fca0a3f6914bee887
-
SHA512
56d4282d9076cd0d69c52aefba76b6634cb01e270f8275fc972917cfe26ad597a685f2f103a52d33a3e553e4a7552b7d79d42efcf9436882a48d903a647a58c8
-
SSDEEP
12288:aVlB29Tew4DtTqBIZqk/x31H8bNjh1PGLnLR:MB29KweTzZqO91elh14LR
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 15 384 rundll32.exe 22 384 rundll32.exe 25 384 rundll32.exe 26 384 rundll32.exe 27 384 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\NvTmRep_CrashReport2_{F2FE1952-0186-36D3-AAHC-B80CA35AH5B6}.job rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 384 rundll32.exe 384 rundll32.exe 384 rundll32.exe 384 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 384 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 384 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 400 wrote to memory of 384 400 rundll32.exe 82 PID 400 wrote to memory of 384 400 rundll32.exe 82 PID 400 wrote to memory of 384 400 rundll32.exe 82 PID 384 wrote to memory of 444 384 rundll32.exe 89 PID 384 wrote to memory of 444 384 rundll32.exe 89 PID 384 wrote to memory of 444 384 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3743a8c944f5c9b17528418bf49b153b978946838f56e5fca0a3f6914bee887.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c3743a8c944f5c9b17528418bf49b153b978946838f56e5fca0a3f6914bee887.dll,#12⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C nltest /domain_trusts > C:\ProgramData\AF32BC.BTFA3⤵PID:444
-
-