Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-10-2022 10:22
Static task
static1
Behavioral task
behavioral1
Sample
42369a40418e1729110878834f0ab16e2cfa271225dd98b26a170aa4f231290a.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
42369a40418e1729110878834f0ab16e2cfa271225dd98b26a170aa4f231290a.dll
Resource
win10v2004-20220812-en
General
-
Target
42369a40418e1729110878834f0ab16e2cfa271225dd98b26a170aa4f231290a.dll
-
Size
163KB
-
MD5
6b40feb191cb174090f6bb36724f83e2
-
SHA1
e40717bc2551740ce477765305b54a5edabd0e5c
-
SHA256
42369a40418e1729110878834f0ab16e2cfa271225dd98b26a170aa4f231290a
-
SHA512
03b7c016e345f9a06bfee2aa1af1b373df9a2f9486de2c830442eb38626a462e81d28e8ce1dda3a95530f5627edfec53bbbbdd84e1777e94710f867104c98fea
-
SSDEEP
3072:fWdkQkwfiFzJ0MAfiI3hlerzbfRH3upHKjn0D5XaZRIOvpLMxS+1x:f+kwu0MAfiwnerzbf13BjnM0Izo+1x
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\a092132f4aa071a62b89dd522172afc2e61ba0f4388780119271e81404a96324.pad rundll32.exe File opened for modification C:\PROGRA~3\a092132f4aa071a62b89dd522172afc2e61ba0f4388780119271e81404a96324.pad rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1316 wrote to memory of 4504 1316 rundll32.exe 81 PID 1316 wrote to memory of 4504 1316 rundll32.exe 81 PID 1316 wrote to memory of 4504 1316 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42369a40418e1729110878834f0ab16e2cfa271225dd98b26a170aa4f231290a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\42369a40418e1729110878834f0ab16e2cfa271225dd98b26a170aa4f231290a.dll,#12⤵
- Drops file in Program Files directory
PID:4504
-