Analysis
-
max time kernel
73s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
07/11/2022, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe
Resource
win10-20220812-en
General
-
Target
963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe
-
Size
1.8MB
-
MD5
c156d8d4b635cf74d0a54a21b369d366
-
SHA1
8a255a7a66500bcc1254e7f96b78ff17805aaaf8
-
SHA256
963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9
-
SHA512
b46a21e8dc0c4781b245962c57f7c1cb66c519f0c0b30e8dc2dadb7136cb998b61a2a95de2b2fbf6461348706617c6cab74f4bb89ca672f6fce8aa7cf8137c24
-
SSDEEP
49152:A6Pa7Zn0NgQ4QsCZMhIQaeR8q4I9u15rIQHjKoBEX:fa7Zn0gQ4Qs4MhIQ7091DHj5B4
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4924 rundll32.exe 4800 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings 963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2832 wrote to memory of 4788 2832 963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe 66 PID 2832 wrote to memory of 4788 2832 963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe 66 PID 2832 wrote to memory of 4788 2832 963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe 66 PID 4788 wrote to memory of 4924 4788 control.exe 68 PID 4788 wrote to memory of 4924 4788 control.exe 68 PID 4788 wrote to memory of 4924 4788 control.exe 68 PID 4924 wrote to memory of 4836 4924 rundll32.exe 69 PID 4924 wrote to memory of 4836 4924 rundll32.exe 69 PID 4836 wrote to memory of 4800 4836 RunDll32.exe 70 PID 4836 wrote to memory of 4800 4836 RunDll32.exe 70 PID 4836 wrote to memory of 4800 4836 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe"C:\Users\Admin\AppData\Local\Temp\963c5f4208b2f629eb966ac29be99e9ce001d59f9c272a2572acdd062a410cd9.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\76eQ.CPl",5⤵
- Loads dropped DLL
PID:4800
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD531fa3b7f327aad03e7e91ca085f02174
SHA1b6bd48a4460c72d61c08301382e65a087aef31be
SHA256245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9
SHA5120ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313
-
Filesize
1.7MB
MD531fa3b7f327aad03e7e91ca085f02174
SHA1b6bd48a4460c72d61c08301382e65a087aef31be
SHA256245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9
SHA5120ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313
-
Filesize
1.7MB
MD531fa3b7f327aad03e7e91ca085f02174
SHA1b6bd48a4460c72d61c08301382e65a087aef31be
SHA256245f8ffd2b19d584f235360981a7563c2c915ed97889d15d0e288ec06af636a9
SHA5120ff7694c9fdc2df7708996ed61059b94783a68c99589aea35614c8f793de41a94d51722fcbe258ad990670f535f24c6ecd924039ee2ff644e698abc27091a313