Analysis
-
max time kernel
64s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
26/10/2022, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
9436dcba706cabd943983e1b34a3e7ee7a5c2c2e45b467a208cd4582828f093b.exe
Resource
win10-20220901-en
General
-
Target
9436dcba706cabd943983e1b34a3e7ee7a5c2c2e45b467a208cd4582828f093b.exe
-
Size
1.7MB
-
MD5
197b7e8022ee311a64e6b61db134b0ee
-
SHA1
9e098f78107958a35a18533c3bb730cafa952e34
-
SHA256
9436dcba706cabd943983e1b34a3e7ee7a5c2c2e45b467a208cd4582828f093b
-
SHA512
fb575f8727dc555f5bf66324ae87044f2728f13e7f7063bca996a0ee8aa475a16cd17c6d4fcb25df95fa6f4303923e6626dddb4a2872bf184003d29037340982
-
SSDEEP
49152:NsW9JP7HPpt8ZtMiUJ55VV3ZEdY67qzBLj4c:uU7HPD8ZqTjZEdY8qzBj
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1316 rundll32.exe 4260 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2484 wrote to memory of 3544 2484 9436dcba706cabd943983e1b34a3e7ee7a5c2c2e45b467a208cd4582828f093b.exe 66 PID 2484 wrote to memory of 3544 2484 9436dcba706cabd943983e1b34a3e7ee7a5c2c2e45b467a208cd4582828f093b.exe 66 PID 2484 wrote to memory of 3544 2484 9436dcba706cabd943983e1b34a3e7ee7a5c2c2e45b467a208cd4582828f093b.exe 66 PID 3544 wrote to memory of 1316 3544 control.exe 67 PID 3544 wrote to memory of 1316 3544 control.exe 67 PID 3544 wrote to memory of 1316 3544 control.exe 67 PID 1316 wrote to memory of 4876 1316 rundll32.exe 68 PID 1316 wrote to memory of 4876 1316 rundll32.exe 68 PID 4876 wrote to memory of 4260 4876 RunDll32.exe 69 PID 4876 wrote to memory of 4260 4876 RunDll32.exe 69 PID 4876 wrote to memory of 4260 4876 RunDll32.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\9436dcba706cabd943983e1b34a3e7ee7a5c2c2e45b467a208cd4582828f093b.exe"C:\Users\Admin\AppData\Local\Temp\9436dcba706cabd943983e1b34a3e7ee7a5c2c2e45b467a208cd4582828f093b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\Vl2Z.o2⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\Vl2Z.o3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\Vl2Z.o4⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\Vl2Z.o5⤵
- Loads dropped DLL
PID:4260
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD533c44938ccc3b83eb947d49410a88426
SHA12bbeb843192a99f8f5b2ea12f186a0857ce549f0
SHA256fdae563df4804d901283360cc8833a83e02ba305c9f2d9c82acee97b87f6627e
SHA512ad1f5c4fdc523dfc545d2a3a0dff7f74a1f3d368e04b02a8a3c9627eb6b012ce3fe67342f4afa963a3f45ca62145856475e018d5c10b360c5286709d10511cbd
-
Filesize
2.9MB
MD533c44938ccc3b83eb947d49410a88426
SHA12bbeb843192a99f8f5b2ea12f186a0857ce549f0
SHA256fdae563df4804d901283360cc8833a83e02ba305c9f2d9c82acee97b87f6627e
SHA512ad1f5c4fdc523dfc545d2a3a0dff7f74a1f3d368e04b02a8a3c9627eb6b012ce3fe67342f4afa963a3f45ca62145856475e018d5c10b360c5286709d10511cbd
-
Filesize
2.9MB
MD533c44938ccc3b83eb947d49410a88426
SHA12bbeb843192a99f8f5b2ea12f186a0857ce549f0
SHA256fdae563df4804d901283360cc8833a83e02ba305c9f2d9c82acee97b87f6627e
SHA512ad1f5c4fdc523dfc545d2a3a0dff7f74a1f3d368e04b02a8a3c9627eb6b012ce3fe67342f4afa963a3f45ca62145856475e018d5c10b360c5286709d10511cbd