Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 01:20
Static task
static1
Behavioral task
behavioral1
Sample
6347a26e32cb37c13775a3c1ed05ef11a344021ee9c5a1545b6a2de7a0fd4d4b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6347a26e32cb37c13775a3c1ed05ef11a344021ee9c5a1545b6a2de7a0fd4d4b.dll
Resource
win10v2004-20220812-en
General
-
Target
6347a26e32cb37c13775a3c1ed05ef11a344021ee9c5a1545b6a2de7a0fd4d4b.dll
-
Size
388KB
-
MD5
6482999ba1c65134f9ccfa0dd3999d80
-
SHA1
a8e54414cda391b4196cd3751a4bc53c76574530
-
SHA256
6347a26e32cb37c13775a3c1ed05ef11a344021ee9c5a1545b6a2de7a0fd4d4b
-
SHA512
17567cc960af5620b3a8b50fb5d45cf5c464b12469ad97e5dfedf09d2a4861c25ac2b832f817ca8e799bbb6c8052e9c38dd4f57174b2edb4e158ad7a35802814
-
SSDEEP
12288:bC7BtdujKkujZckVd888888888888W888888888883:OvdujhujZckV
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rundll32.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3044 wrote to memory of 3208 3044 rundll32.exe 83 PID 3044 wrote to memory of 3208 3044 rundll32.exe 83 PID 3044 wrote to memory of 3208 3044 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6347a26e32cb37c13775a3c1ed05ef11a344021ee9c5a1545b6a2de7a0fd4d4b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6347a26e32cb37c13775a3c1ed05ef11a344021ee9c5a1545b6a2de7a0fd4d4b.dll,#12⤵
- Drops file in System32 directory
PID:3208
-