Analysis

  • max time kernel
    167s
  • max time network
    180s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 22:47

General

  • Target

    432c7deaa94233bb593355f3ecefc5acbc8e6359c1306bdac6c3c35c9655d07e.dll

  • Size

    131KB

  • MD5

    439f446dbf3e1ac53b023dbc57f61150

  • SHA1

    deb4c1b983ce4323c3ca5467d4b6756237c9bd66

  • SHA256

    432c7deaa94233bb593355f3ecefc5acbc8e6359c1306bdac6c3c35c9655d07e

  • SHA512

    c479f5a4083b67bf7cac8d20eae7305db4064703d2194ee89a06acb75a73018fde8d65d35293e0f4accfd1f592227d6249762ec51008942d0a892c51ea5ae99d

  • SSDEEP

    3072:85iNSyHzZB2M1mzCLG9FpYHE/fhaQmMXJUZn:FTZsemmLEpYk/YM5U

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\432c7deaa94233bb593355f3ecefc5acbc8e6359c1306bdac6c3c35c9655d07e.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\432c7deaa94233bb593355f3ecefc5acbc8e6359c1306bdac6c3c35c9655d07e.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Sets DLL path for service in the registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\PROGRA~3\299219~1\lr42vjz.cpp,work
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        PID:3788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~3\299219~1\lr42vjz.cpp

    Filesize

    131KB

    MD5

    439f446dbf3e1ac53b023dbc57f61150

    SHA1

    deb4c1b983ce4323c3ca5467d4b6756237c9bd66

    SHA256

    432c7deaa94233bb593355f3ecefc5acbc8e6359c1306bdac6c3c35c9655d07e

    SHA512

    c479f5a4083b67bf7cac8d20eae7305db4064703d2194ee89a06acb75a73018fde8d65d35293e0f4accfd1f592227d6249762ec51008942d0a892c51ea5ae99d

  • C:\ProgramData\2992199F9A\lr42vjz.cpp

    Filesize

    131KB

    MD5

    439f446dbf3e1ac53b023dbc57f61150

    SHA1

    deb4c1b983ce4323c3ca5467d4b6756237c9bd66

    SHA256

    432c7deaa94233bb593355f3ecefc5acbc8e6359c1306bdac6c3c35c9655d07e

    SHA512

    c479f5a4083b67bf7cac8d20eae7305db4064703d2194ee89a06acb75a73018fde8d65d35293e0f4accfd1f592227d6249762ec51008942d0a892c51ea5ae99d

  • memory/3788-139-0x0000000002C30000-0x0000000002C61000-memory.dmp

    Filesize

    196KB

  • memory/3788-140-0x00000000013E0000-0x0000000001411000-memory.dmp

    Filesize

    196KB

  • memory/3788-141-0x0000000002C30000-0x0000000002C61000-memory.dmp

    Filesize

    196KB

  • memory/3788-143-0x0000000002C30000-0x0000000002C61000-memory.dmp

    Filesize

    196KB

  • memory/4568-133-0x00000000024C0000-0x00000000024F1000-memory.dmp

    Filesize

    196KB

  • memory/4568-135-0x00000000024C0000-0x00000000024F1000-memory.dmp

    Filesize

    196KB

  • memory/4568-134-0x0000000002410000-0x0000000002441000-memory.dmp

    Filesize

    196KB

  • memory/4568-142-0x00000000024C0000-0x00000000024F1000-memory.dmp

    Filesize

    196KB