Analysis
-
max time kernel
54s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
02/11/2022, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c.exe
Resource
win10-20220812-en
General
-
Target
76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c.exe
-
Size
2.1MB
-
MD5
2eaf293a7890ed62be1fe892de89a7b8
-
SHA1
b4ee6e3c96b891838689f128783efaa4ee84c9f3
-
SHA256
76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c
-
SHA512
a23b6a04974b0d5c16b6e644e628130061947518f2d036e0a88dbb46e88ccb6382a361ccea72c8747e23c48f945119bbc25f423525e993e8cced24881a145211
-
SSDEEP
49152:C3d3VuNANPtP86CKq142o3MJJjs6LuXt886ahLn:CtVWArk6CU2ocJJjC+86On
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4904 rundll32.exe 4904 rundll32.exe 1888 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings 76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2404 wrote to memory of 5088 2404 76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c.exe 66 PID 2404 wrote to memory of 5088 2404 76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c.exe 66 PID 2404 wrote to memory of 5088 2404 76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c.exe 66 PID 5088 wrote to memory of 4904 5088 control.exe 68 PID 5088 wrote to memory of 4904 5088 control.exe 68 PID 5088 wrote to memory of 4904 5088 control.exe 68 PID 4904 wrote to memory of 3952 4904 rundll32.exe 69 PID 4904 wrote to memory of 3952 4904 rundll32.exe 69 PID 3952 wrote to memory of 1888 3952 RunDll32.exe 70 PID 3952 wrote to memory of 1888 3952 RunDll32.exe 70 PID 3952 wrote to memory of 1888 3952 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c.exe"C:\Users\Admin\AppData\Local\Temp\76a697c87b4940770bc742ca0f90b7018322a12593db77d5142359a22a35768c.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\sxhVP.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\sxhVP.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\sxhVP.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\sxhVP.CpL",5⤵
- Loads dropped DLL
PID:1888
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5d19ce8c05e4de2da241ce2d6c897f2bd
SHA102679a3d2b4e5b77924da8284312a9f3f3fd5123
SHA2566a38b26a0957606a4b3954b04fce48a8976a129a445d7e5d36d0adcc2192ff9d
SHA512e4027266d19ca49a5eee4c46afb45961dfc7bf2355c6272a7ce678c68a4bcddacf83d281297d63ff270f8a1614e323591104bd246213b7120dbfde07e62e88bb
-
Filesize
2.0MB
MD5d19ce8c05e4de2da241ce2d6c897f2bd
SHA102679a3d2b4e5b77924da8284312a9f3f3fd5123
SHA2566a38b26a0957606a4b3954b04fce48a8976a129a445d7e5d36d0adcc2192ff9d
SHA512e4027266d19ca49a5eee4c46afb45961dfc7bf2355c6272a7ce678c68a4bcddacf83d281297d63ff270f8a1614e323591104bd246213b7120dbfde07e62e88bb
-
Filesize
2.0MB
MD5d19ce8c05e4de2da241ce2d6c897f2bd
SHA102679a3d2b4e5b77924da8284312a9f3f3fd5123
SHA2566a38b26a0957606a4b3954b04fce48a8976a129a445d7e5d36d0adcc2192ff9d
SHA512e4027266d19ca49a5eee4c46afb45961dfc7bf2355c6272a7ce678c68a4bcddacf83d281297d63ff270f8a1614e323591104bd246213b7120dbfde07e62e88bb
-
Filesize
2.0MB
MD5d19ce8c05e4de2da241ce2d6c897f2bd
SHA102679a3d2b4e5b77924da8284312a9f3f3fd5123
SHA2566a38b26a0957606a4b3954b04fce48a8976a129a445d7e5d36d0adcc2192ff9d
SHA512e4027266d19ca49a5eee4c46afb45961dfc7bf2355c6272a7ce678c68a4bcddacf83d281297d63ff270f8a1614e323591104bd246213b7120dbfde07e62e88bb