Analysis
-
max time kernel
74s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
14-10-2022 16:07
Static task
static1
Behavioral task
behavioral1
Sample
be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997.exe
Resource
win10-20220812-en
General
-
Target
be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997.exe
-
Size
1.8MB
-
MD5
573f602d7d050cb583d3445ebd50f9cd
-
SHA1
cf0342899515091205b87c0949623eeb6bd2f641
-
SHA256
be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997
-
SHA512
7c7085d6d522444683dd336b7d8538699f9fcab3a43a5a07fb91e37753b6be5aa4de4dd5aa930238ef1711ae6c85a79f199dfb347df4fc3d82e80b1750ec2ec0
-
SSDEEP
49152:KyFw1Wil/Xf3Bv56uAvBdyUr9jytKjgTZI2LgC:Kyq0idBv5zAzDj/jOI2P
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4876 rundll32.exe 4784 rundll32.exe 4784 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4832 2772 be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997.exe 66 PID 2772 wrote to memory of 4832 2772 be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997.exe 66 PID 2772 wrote to memory of 4832 2772 be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997.exe 66 PID 4832 wrote to memory of 4876 4832 control.exe 68 PID 4832 wrote to memory of 4876 4832 control.exe 68 PID 4832 wrote to memory of 4876 4832 control.exe 68 PID 4876 wrote to memory of 4808 4876 rundll32.exe 69 PID 4876 wrote to memory of 4808 4876 rundll32.exe 69 PID 4808 wrote to memory of 4784 4808 RunDll32.exe 70 PID 4808 wrote to memory of 4784 4808 RunDll32.exe 70 PID 4808 wrote to memory of 4784 4808 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997.exe"C:\Users\Admin\AppData\Local\Temp\be2112278caed588b4d017a8314305f9a469b2ebb3688c253f2a7ef61abeb997.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\VJSR.cpL",2⤵
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\VJSR.cpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\VJSR.cpL",4⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\VJSR.cpL",5⤵
- Loads dropped DLL
PID:4784
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e864ec7f2a0e2afe88fb7223a45a65c8
SHA12486fc2e5f9cee2d58578540bbc7523b9baee7c0
SHA256451705d74ae80b1e14b51d85861dfa8eaa529540eb17253a7027984794b11195
SHA5123d400a5f84e811d020f70aee44d33efb67f532a10ec811566b288788c06c69dfe8696603a2c816b5189dcea8f3e863f90d91abc3d03c73ba257ade4615ab9fef
-
Filesize
1.8MB
MD5e864ec7f2a0e2afe88fb7223a45a65c8
SHA12486fc2e5f9cee2d58578540bbc7523b9baee7c0
SHA256451705d74ae80b1e14b51d85861dfa8eaa529540eb17253a7027984794b11195
SHA5123d400a5f84e811d020f70aee44d33efb67f532a10ec811566b288788c06c69dfe8696603a2c816b5189dcea8f3e863f90d91abc3d03c73ba257ade4615ab9fef
-
Filesize
1.8MB
MD5e864ec7f2a0e2afe88fb7223a45a65c8
SHA12486fc2e5f9cee2d58578540bbc7523b9baee7c0
SHA256451705d74ae80b1e14b51d85861dfa8eaa529540eb17253a7027984794b11195
SHA5123d400a5f84e811d020f70aee44d33efb67f532a10ec811566b288788c06c69dfe8696603a2c816b5189dcea8f3e863f90d91abc3d03c73ba257ade4615ab9fef
-
Filesize
1.8MB
MD5e864ec7f2a0e2afe88fb7223a45a65c8
SHA12486fc2e5f9cee2d58578540bbc7523b9baee7c0
SHA256451705d74ae80b1e14b51d85861dfa8eaa529540eb17253a7027984794b11195
SHA5123d400a5f84e811d020f70aee44d33efb67f532a10ec811566b288788c06c69dfe8696603a2c816b5189dcea8f3e863f90d91abc3d03c73ba257ade4615ab9fef