Analysis
-
max time kernel
51s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2022, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43.exe
Resource
win10-20220812-en
General
-
Target
6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43.exe
-
Size
1.5MB
-
MD5
ced2db588cb49b200c38f98e944ec722
-
SHA1
1ebfbc0f1dbb1e5263c2538771ecaaa20db9d908
-
SHA256
6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43
-
SHA512
15b4353058b0c15bebc023e29ba2cafe1db5e884ca87b745bbca7a9d31792edb252631f7de403f5cbe53b7981fa969f776dbd873f9da26ff956e8d77f29746f5
-
SSDEEP
24576:O208/RKHuEBPuBZNPi8jf+PSnlmj/9SVuB+zabuaYvXvrUsMKlmdgpx1KoyEI7Qb:908/RY6V+P4lmr9euEzabutXGNdgpCCr
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4508 rundll32.exe 4876 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings 6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3488 wrote to memory of 3600 3488 6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43.exe 66 PID 3488 wrote to memory of 3600 3488 6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43.exe 66 PID 3488 wrote to memory of 3600 3488 6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43.exe 66 PID 3600 wrote to memory of 4508 3600 control.exe 68 PID 3600 wrote to memory of 4508 3600 control.exe 68 PID 3600 wrote to memory of 4508 3600 control.exe 68 PID 4508 wrote to memory of 3560 4508 rundll32.exe 69 PID 4508 wrote to memory of 3560 4508 rundll32.exe 69 PID 3560 wrote to memory of 4876 3560 RunDll32.exe 70 PID 3560 wrote to memory of 4876 3560 RunDll32.exe 70 PID 3560 wrote to memory of 4876 3560 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43.exe"C:\Users\Admin\AppData\Local\Temp\6782b0a5ffe8e4004557bcb41231030176bf5e10e1181cb30781c5f9ceda0e43.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\VTHr0R.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\VTHr0R.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\VTHr0R.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\VTHr0R.cPl",5⤵
- Loads dropped DLL
PID:4876
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5cc9889511d2243bed7b3b1593c11ddca
SHA17af2baafe8c5f25b1366849c8b792b091b0ac01d
SHA2567170fcc7da5802d6df4a12ee1f495a0e175ef382b0b763bfdb88086cd6eb5904
SHA512a23204e883821e441e9746f8b800256a4ade0067c77b18a47a810a56b7dc2b29689fc96381b55ecc7a3a078a44575d173569174e38698fa28b209bb24c53bfac
-
Filesize
1.5MB
MD5cc9889511d2243bed7b3b1593c11ddca
SHA17af2baafe8c5f25b1366849c8b792b091b0ac01d
SHA2567170fcc7da5802d6df4a12ee1f495a0e175ef382b0b763bfdb88086cd6eb5904
SHA512a23204e883821e441e9746f8b800256a4ade0067c77b18a47a810a56b7dc2b29689fc96381b55ecc7a3a078a44575d173569174e38698fa28b209bb24c53bfac
-
Filesize
1.5MB
MD5cc9889511d2243bed7b3b1593c11ddca
SHA17af2baafe8c5f25b1366849c8b792b091b0ac01d
SHA2567170fcc7da5802d6df4a12ee1f495a0e175ef382b0b763bfdb88086cd6eb5904
SHA512a23204e883821e441e9746f8b800256a4ade0067c77b18a47a810a56b7dc2b29689fc96381b55ecc7a3a078a44575d173569174e38698fa28b209bb24c53bfac