Analysis
-
max time kernel
52s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21-11-2022 20:19
Static task
static1
Behavioral task
behavioral1
Sample
3b7191d12e7f38205d617b66a1b8057841bd4c560fb79f19aeff40a85fe96a02.exe
Resource
win10-20220812-en
General
-
Target
3b7191d12e7f38205d617b66a1b8057841bd4c560fb79f19aeff40a85fe96a02.exe
-
Size
1.6MB
-
MD5
e5df4257598736d985c05e748117ca0c
-
SHA1
4f0de0f650b0afbf5b8f630542ae25a1ea4a59c7
-
SHA256
3b7191d12e7f38205d617b66a1b8057841bd4c560fb79f19aeff40a85fe96a02
-
SHA512
a60704d541c804a1ff628658144cb4dd9a00902f3a4dcfc279985f92268ad794fdacd8509c403aa974113babd9c27d25e26c38cf6e126e582ff608c09ceffad6
-
SSDEEP
24576:pLlgAi5bS+CY55kP14R1myFiMLO5aK742JXU7dlJMW6Oe4jnr+yXiiXk9cw3z2t:py5rkPQ1Qh2m4XS9z3zo
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1124 rundll32.exe 4044 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2740 wrote to memory of 4228 2740 3b7191d12e7f38205d617b66a1b8057841bd4c560fb79f19aeff40a85fe96a02.exe 66 PID 2740 wrote to memory of 4228 2740 3b7191d12e7f38205d617b66a1b8057841bd4c560fb79f19aeff40a85fe96a02.exe 66 PID 2740 wrote to memory of 4228 2740 3b7191d12e7f38205d617b66a1b8057841bd4c560fb79f19aeff40a85fe96a02.exe 66 PID 4228 wrote to memory of 1124 4228 control.exe 67 PID 4228 wrote to memory of 1124 4228 control.exe 67 PID 4228 wrote to memory of 1124 4228 control.exe 67 PID 1124 wrote to memory of 1768 1124 rundll32.exe 68 PID 1124 wrote to memory of 1768 1124 rundll32.exe 68 PID 1768 wrote to memory of 4044 1768 RunDll32.exe 69 PID 1768 wrote to memory of 4044 1768 RunDll32.exe 69 PID 1768 wrote to memory of 4044 1768 RunDll32.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b7191d12e7f38205d617b66a1b8057841bd4c560fb79f19aeff40a85fe96a02.exe"C:\Users\Admin\AppData\Local\Temp\3b7191d12e7f38205d617b66a1b8057841bd4c560fb79f19aeff40a85fe96a02.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\Y4qZS2w.W2⤵
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\Y4qZS2w.W3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\Y4qZS2w.W4⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\Y4qZS2w.W5⤵
- Loads dropped DLL
PID:4044
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5862aa25f3c177d4103bdba45a594b5fc
SHA1521be87157ee92615b2d5e7ae4fe91cb6dbefb38
SHA256f45ed0ebf2a082cec340e96341b51a901e0678dff0c1b2b992bed38454ee1a07
SHA512faf2125faf12101ab964f0603562ac4826b93ccf1b0497759706967536550816f8d4c9d1673d3bceafc3739bad7570d4500984d3b7b9e1bf6f1ed7c04eae1aa4
-
Filesize
1.6MB
MD5862aa25f3c177d4103bdba45a594b5fc
SHA1521be87157ee92615b2d5e7ae4fe91cb6dbefb38
SHA256f45ed0ebf2a082cec340e96341b51a901e0678dff0c1b2b992bed38454ee1a07
SHA512faf2125faf12101ab964f0603562ac4826b93ccf1b0497759706967536550816f8d4c9d1673d3bceafc3739bad7570d4500984d3b7b9e1bf6f1ed7c04eae1aa4
-
Filesize
1.6MB
MD5862aa25f3c177d4103bdba45a594b5fc
SHA1521be87157ee92615b2d5e7ae4fe91cb6dbefb38
SHA256f45ed0ebf2a082cec340e96341b51a901e0678dff0c1b2b992bed38454ee1a07
SHA512faf2125faf12101ab964f0603562ac4826b93ccf1b0497759706967536550816f8d4c9d1673d3bceafc3739bad7570d4500984d3b7b9e1bf6f1ed7c04eae1aa4