Analysis
-
max time kernel
27s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
142ba96c313233cead4ff8620bd977596a9992fa36729a357cc5a3c6116ccb45.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
142ba96c313233cead4ff8620bd977596a9992fa36729a357cc5a3c6116ccb45.dll
Resource
win10v2004-20220812-en
General
-
Target
142ba96c313233cead4ff8620bd977596a9992fa36729a357cc5a3c6116ccb45.dll
-
Size
36KB
-
MD5
570917fe7bc753119fa869d2e69c0918
-
SHA1
c4509144b8e63cd92324fe7353abfd3bf32d4a13
-
SHA256
142ba96c313233cead4ff8620bd977596a9992fa36729a357cc5a3c6116ccb45
-
SHA512
11591403aff44da3cef9b8eac86feeb65df2158ce40dcb7cee502542e911a506beb5bc2fb2ae3e12b23bccc97a1f4d2d64672ec061e3e4c4ffb621d62b9137e0
-
SSDEEP
384:DqgZzRc9yOYwLVy+kDguVSLrYvTttHk+aQv1pFw/O58DYl:DlackuVgrYLLEzs1XIOWE
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\regfile\shell\open\command\ = "regedit.exe /s \"%1\"" rundll32.exe -
Runs .reg file with regedit 1 IoCs
pid Process 944 regedit.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1364 rundll32.exe 1364 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1756 wrote to memory of 1364 1756 rundll32.exe 27 PID 1756 wrote to memory of 1364 1756 rundll32.exe 27 PID 1756 wrote to memory of 1364 1756 rundll32.exe 27 PID 1756 wrote to memory of 1364 1756 rundll32.exe 27 PID 1756 wrote to memory of 1364 1756 rundll32.exe 27 PID 1756 wrote to memory of 1364 1756 rundll32.exe 27 PID 1756 wrote to memory of 1364 1756 rundll32.exe 27 PID 1364 wrote to memory of 1516 1364 rundll32.exe 28 PID 1364 wrote to memory of 1516 1364 rundll32.exe 28 PID 1364 wrote to memory of 1516 1364 rundll32.exe 28 PID 1364 wrote to memory of 1516 1364 rundll32.exe 28 PID 1516 wrote to memory of 944 1516 cmd.exe 30 PID 1516 wrote to memory of 944 1516 cmd.exe 30 PID 1516 wrote to memory of 944 1516 cmd.exe 30 PID 1516 wrote to memory of 944 1516 cmd.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\142ba96c313233cead4ff8620bd977596a9992fa36729a357cc5a3c6116ccb45.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\142ba96c313233cead4ff8620bd977596a9992fa36729a357cc5a3c6116ccb45.dll,#12⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a.reg3⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\regedit.exe"regedit.exe" /s "C:\Users\Admin\AppData\Local\Temp\a.reg"4⤵
- Runs .reg file with regedit
PID:944
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b100f5324ef74ded0b998e64d07a2e19
SHA140b0d7f51bf2dd8451f1b723d21355c471a5fa46
SHA2563db613d24a75ae220891698c055e1c580a42e58564f568a0510db87581cc2042
SHA512c12391bb37c334074f7d7e1257b6364fd5cbce848e0a8fe15b8326f54fd9568fe3baec58618c4334027a774a06a08ec249cb71db925c1f85feee6a3d3a816c04