Analysis
-
max time kernel
63s -
max time network
67s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06/11/2022, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec.exe
Resource
win10-20220901-en
General
-
Target
0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec.exe
-
Size
1.5MB
-
MD5
ba1f18b2fea90cbe9741105fa0ab67c4
-
SHA1
b092d96c5d3c829a9da0bf5cd744c3f769f0ae2b
-
SHA256
0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec
-
SHA512
e018a686bc95f93256b6cccc6d1e21a0c8d4ad499ebe6f9867a12f5bb0dc6a7cb8d9a3619a8cafb6b9506c6c04b6969eed4e521ff00e13e1caee592cde5f268f
-
SSDEEP
24576:gJr8tE+gHq7IbLmhjDjeQBsa9GPhUNn+39Dq+f9/ImnOzJByq7LO2AwcY:gJ4NMn6iQJ9+Kn+tDzf9/dOlBB7LanY
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4892 rundll32.exe 1844 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings 0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4796 wrote to memory of 3308 4796 0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec.exe 66 PID 4796 wrote to memory of 3308 4796 0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec.exe 66 PID 4796 wrote to memory of 3308 4796 0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec.exe 66 PID 3308 wrote to memory of 4892 3308 control.exe 68 PID 3308 wrote to memory of 4892 3308 control.exe 68 PID 3308 wrote to memory of 4892 3308 control.exe 68 PID 4892 wrote to memory of 3192 4892 rundll32.exe 69 PID 4892 wrote to memory of 3192 4892 rundll32.exe 69 PID 3192 wrote to memory of 1844 3192 RunDll32.exe 70 PID 3192 wrote to memory of 1844 3192 RunDll32.exe 70 PID 3192 wrote to memory of 1844 3192 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec.exe"C:\Users\Admin\AppData\Local\Temp\0ff9d245ed581b8695b6b0ccc745424548579ed33c260c49efeab73456ad10ec.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\B4SN_H.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\B4SN_H.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\B4SN_H.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\B4SN_H.cPL",5⤵
- Loads dropped DLL
PID:1844
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5540517572d8a677daca34f31c1ed96d5
SHA13a9c274b8c23d885d407f0fd08373e757868a79c
SHA2566617bed4f44f01a88b3098261b29bcf946717409611831e64b90381ef30a6526
SHA5125a304ec158f177eb5c82c4aaf5fe8d79d5d4e4fb80b018e2598f6cea092c9ea5f9f1046065f20288cca25fa554391bee08c5e933e3a9fccad76a2910e313fcd0
-
Filesize
1.4MB
MD5540517572d8a677daca34f31c1ed96d5
SHA13a9c274b8c23d885d407f0fd08373e757868a79c
SHA2566617bed4f44f01a88b3098261b29bcf946717409611831e64b90381ef30a6526
SHA5125a304ec158f177eb5c82c4aaf5fe8d79d5d4e4fb80b018e2598f6cea092c9ea5f9f1046065f20288cca25fa554391bee08c5e933e3a9fccad76a2910e313fcd0
-
Filesize
1.4MB
MD5540517572d8a677daca34f31c1ed96d5
SHA13a9c274b8c23d885d407f0fd08373e757868a79c
SHA2566617bed4f44f01a88b3098261b29bcf946717409611831e64b90381ef30a6526
SHA5125a304ec158f177eb5c82c4aaf5fe8d79d5d4e4fb80b018e2598f6cea092c9ea5f9f1046065f20288cca25fa554391bee08c5e933e3a9fccad76a2910e313fcd0