Analysis

  • max time kernel
    73s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07/11/2022, 10:30

General

  • Target

    963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe

  • Size

    1.8MB

  • MD5

    c156d8d4b635cf74d0a54a21b369d366

  • SHA1

    8a255a7a66500bcc1254e7f96b78ff17805aaaf8

  • SHA256

    963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9

  • SHA512

    b46a21e8dc0c4781b245962c57f7c1cb66c519f0c0b30e8dc2dadb7136cb998b61a2a95de2b2fbf6461348706617c6cab74f4bb89ca672f6fce8aa7cf8137c24

  • SSDEEP

    49152:A6Pa7Zn0NgQ4QsCZMhIQaeR8q4I9u15rIQHjKoBEX:fa7Zn0gQ4Qs4MhIQ7091DHj5B4

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe
    "C:\Users\Admin\AppData\Local\Temp\963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4924
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4836
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",
            5⤵
            • Loads dropped DLL
            PID:4800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\76eQ.CPl

    Filesize

    1.7MB

    MD5

    31fa3b7f327aad03e7e91ca085f02174

    SHA1

    b6bd48a4460c72d61c08301382e65a087aef31be

    SHA256

    245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9

    SHA512

    0ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313

  • \Users\Admin\AppData\Local\Temp\76eQ.cpl

    Filesize

    1.7MB

    MD5

    31fa3b7f327aad03e7e91ca085f02174

    SHA1

    b6bd48a4460c72d61c08301382e65a087aef31be

    SHA256

    245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9

    SHA512

    0ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313

  • \Users\Admin\AppData\Local\Temp\76eQ.cpl

    Filesize

    1.7MB

    MD5

    31fa3b7f327aad03e7e91ca085f02174

    SHA1

    b6bd48a4460c72d61c08301382e65a087aef31be

    SHA256

    245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9

    SHA512

    0ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313

  • memory/2832-152-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-163-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-117-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-118-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-120-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-121-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-123-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-124-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-125-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-126-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-153-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-128-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-129-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-130-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-131-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-132-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-133-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-134-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-135-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-136-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-138-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-137-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-139-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-140-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-141-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-142-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-143-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-144-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-145-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-146-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-147-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-148-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-149-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-150-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-155-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-115-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-127-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-116-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-151-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-156-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-157-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-158-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-159-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-160-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-161-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-162-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-154-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-165-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-164-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-167-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-166-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-168-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-169-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-170-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-171-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-173-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-172-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-175-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-174-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-176-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-177-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-178-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-179-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/2832-180-0x00000000775B0000-0x000000007773E000-memory.dmp

    Filesize

    1.6MB

  • memory/4800-332-0x0000000004E00000-0x0000000004F48000-memory.dmp

    Filesize

    1.3MB

  • memory/4800-331-0x0000000004B60000-0x0000000004CAC000-memory.dmp

    Filesize

    1.3MB

  • memory/4800-341-0x0000000004E00000-0x0000000004F48000-memory.dmp

    Filesize

    1.3MB

  • memory/4924-274-0x0000000004E60000-0x0000000004FAC000-memory.dmp

    Filesize

    1.3MB

  • memory/4924-275-0x0000000005100000-0x0000000005248000-memory.dmp

    Filesize

    1.3MB

  • memory/4924-343-0x0000000005100000-0x0000000005248000-memory.dmp

    Filesize

    1.3MB