Analysis
-
max time kernel
151s -
max time network
170s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12-10-2022 06:41
Static task
static1
Behavioral task
behavioral1
Sample
72578c2b3a5a8936c76296ee586ebbeb3bdc284f8635e917d8bc39a1a36d65ec.exe
Resource
win10-20220812-en
General
-
Target
72578c2b3a5a8936c76296ee586ebbeb3bdc284f8635e917d8bc39a1a36d65ec.exe
-
Size
1.7MB
-
MD5
c867696196477b5be6bd78c138a90d29
-
SHA1
6ea0d4a9b6492269c484483c1ab7aeb0e9caaa88
-
SHA256
72578c2b3a5a8936c76296ee586ebbeb3bdc284f8635e917d8bc39a1a36d65ec
-
SHA512
aa7f80ec87ed3baf68cfd05c9f089885280df9d0a950a12c153599571f72fffe65feef6cbfe0759f0dc93c47297f4da31a6b985d16d4434795039a9b01462e87
-
SSDEEP
49152:KyrPgD7u9yTnMpUV1PCkfIYUw9F35bq2B9HioFqhkulR:KyrGzTMOPClY5335xrHPgR
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2016 rundll32.exe 4492 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2716 wrote to memory of 4108 2716 72578c2b3a5a8936c76296ee586ebbeb3bdc284f8635e917d8bc39a1a36d65ec.exe 66 PID 2716 wrote to memory of 4108 2716 72578c2b3a5a8936c76296ee586ebbeb3bdc284f8635e917d8bc39a1a36d65ec.exe 66 PID 2716 wrote to memory of 4108 2716 72578c2b3a5a8936c76296ee586ebbeb3bdc284f8635e917d8bc39a1a36d65ec.exe 66 PID 4108 wrote to memory of 2016 4108 control.exe 67 PID 4108 wrote to memory of 2016 4108 control.exe 67 PID 4108 wrote to memory of 2016 4108 control.exe 67 PID 2016 wrote to memory of 2820 2016 rundll32.exe 68 PID 2016 wrote to memory of 2820 2016 rundll32.exe 68 PID 2820 wrote to memory of 4492 2820 RunDll32.exe 69 PID 2820 wrote to memory of 4492 2820 RunDll32.exe 69 PID 2820 wrote to memory of 4492 2820 RunDll32.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\72578c2b3a5a8936c76296ee586ebbeb3bdc284f8635e917d8bc39a1a36d65ec.exe"C:\Users\Admin\AppData\Local\Temp\72578c2b3a5a8936c76296ee586ebbeb3bdc284f8635e917d8bc39a1a36d65ec.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\OEUV.UFd2⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\OEUV.UFd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\OEUV.UFd4⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\OEUV.UFd5⤵
- Loads dropped DLL
PID:4492
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD55170e8fb133313790e5fcaba6578af45
SHA1cfb5e42bf18baa3a0dd520784c070f71eff61e0b
SHA25636cf0c81e55e2d7dda843af20db64bce8f808d75482f6f4abbfbcb8121e81d47
SHA512d4383ccd8c667a3876daf1f6abda10d860e5568497ef40dd657221f52314ddaa73d5ad376307fb9b11ae0082fdff83a9b932655dd90f038d226aabd521f72a07
-
Filesize
1.8MB
MD55170e8fb133313790e5fcaba6578af45
SHA1cfb5e42bf18baa3a0dd520784c070f71eff61e0b
SHA25636cf0c81e55e2d7dda843af20db64bce8f808d75482f6f4abbfbcb8121e81d47
SHA512d4383ccd8c667a3876daf1f6abda10d860e5568497ef40dd657221f52314ddaa73d5ad376307fb9b11ae0082fdff83a9b932655dd90f038d226aabd521f72a07
-
Filesize
1.8MB
MD55170e8fb133313790e5fcaba6578af45
SHA1cfb5e42bf18baa3a0dd520784c070f71eff61e0b
SHA25636cf0c81e55e2d7dda843af20db64bce8f808d75482f6f4abbfbcb8121e81d47
SHA512d4383ccd8c667a3876daf1f6abda10d860e5568497ef40dd657221f52314ddaa73d5ad376307fb9b11ae0082fdff83a9b932655dd90f038d226aabd521f72a07