Analysis
-
max time kernel
141s -
max time network
161s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/11/2022, 07:31
Static task
static1
Behavioral task
behavioral1
Sample
4481727c57a87990d8bc87742ae1ede726194c9f31c67d876638571484195aea.exe
Resource
win10-20220812-en
General
-
Target
4481727c57a87990d8bc87742ae1ede726194c9f31c67d876638571484195aea.exe
-
Size
1.7MB
-
MD5
0aa47b05eb5bd60025130c62b0e8042b
-
SHA1
820d63efcf309ff0644d8629bcc2467d6d9a91e7
-
SHA256
4481727c57a87990d8bc87742ae1ede726194c9f31c67d876638571484195aea
-
SHA512
f13936c9c4165576298fda7a47dea90ef7f39c4f0c2676f7a0d9c6a876d5863e92e2dadc98709968a64def48c63c379f88473963aa9a142fbf7fab1a2205512a
-
SSDEEP
24576:KLlgAiobHS80F2LKA853QShfNhEq5jnPDxVve/6BmZDft7V7cgEwXGJFakIgj:Ky98ewKAe3QSxjPDxVk68f5VywXGJFhr
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2000 regsvr32.exe 2000 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3876 wrote to memory of 2000 3876 4481727c57a87990d8bc87742ae1ede726194c9f31c67d876638571484195aea.exe 66 PID 3876 wrote to memory of 2000 3876 4481727c57a87990d8bc87742ae1ede726194c9f31c67d876638571484195aea.exe 66 PID 3876 wrote to memory of 2000 3876 4481727c57a87990d8bc87742ae1ede726194c9f31c67d876638571484195aea.exe 66
Processes
-
C:\Users\Admin\AppData\Local\Temp\4481727c57a87990d8bc87742ae1ede726194c9f31c67d876638571484195aea.exe"C:\Users\Admin\AppData\Local\Temp\4481727c57a87990d8bc87742ae1ede726194c9f31c67d876638571484195aea.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /u .\FteAPI.9G /S2⤵
- Loads dropped DLL
PID:2000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5c6b1e09e3646d699681fb2b09d4ef0a9
SHA18e33ad388a0385f9dd18ef71ea685498e4869efa
SHA256d38811bd2d85b11eda14e2ff5e6053c0884a25f6c24f9563adece69ef654d15e
SHA512112c4c1aba7074872dbe8938941236e07271ec6b7a8e8870a872afb4ee5ce962589a3bf9f8ffb8b71adcffd823fc6de484fa99cca37edb96636de7bed7e9b003
-
Filesize
1.6MB
MD5c6b1e09e3646d699681fb2b09d4ef0a9
SHA18e33ad388a0385f9dd18ef71ea685498e4869efa
SHA256d38811bd2d85b11eda14e2ff5e6053c0884a25f6c24f9563adece69ef654d15e
SHA512112c4c1aba7074872dbe8938941236e07271ec6b7a8e8870a872afb4ee5ce962589a3bf9f8ffb8b71adcffd823fc6de484fa99cca37edb96636de7bed7e9b003
-
Filesize
1.6MB
MD5c6b1e09e3646d699681fb2b09d4ef0a9
SHA18e33ad388a0385f9dd18ef71ea685498e4869efa
SHA256d38811bd2d85b11eda14e2ff5e6053c0884a25f6c24f9563adece69ef654d15e
SHA512112c4c1aba7074872dbe8938941236e07271ec6b7a8e8870a872afb4ee5ce962589a3bf9f8ffb8b71adcffd823fc6de484fa99cca37edb96636de7bed7e9b003