Analysis
-
max time kernel
61s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 07:21
Static task
static1
Behavioral task
behavioral1
Sample
143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exe
Resource
win10-20220812-en
General
-
Target
143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exe
-
Size
1.8MB
-
MD5
38bca8d883aa2e2565c5ffd3d9c10fcd
-
SHA1
cad1f753214074e11c6b081a14b8573b9e674655
-
SHA256
143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218
-
SHA512
9cc6d3fccef7f45e0180bfe8cc7382a02882284326c1859f4f5b88e9690dc8e2e76a23c43249f5b436844716d3821d2afdd62a5235455071ef7d3721a6ba5cb3
-
SSDEEP
24576:9GHCm8uPdJmX2zzMrYRNx70DkJy3nWxvW6Li5jUnDL2V3rK4ZRLQ13OYiW4119Ps:EuWxsIuDacWVJSmD0FZq13OYyaBr
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
rundll32.exerundll32.exepid process 4940 rundll32.exe 4940 rundll32.exe 4588 rundll32.exe 4588 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings 143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 2716 wrote to memory of 5072 2716 143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exe control.exe PID 2716 wrote to memory of 5072 2716 143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exe control.exe PID 2716 wrote to memory of 5072 2716 143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exe control.exe PID 5072 wrote to memory of 4940 5072 control.exe rundll32.exe PID 5072 wrote to memory of 4940 5072 control.exe rundll32.exe PID 5072 wrote to memory of 4940 5072 control.exe rundll32.exe PID 4940 wrote to memory of 4072 4940 rundll32.exe RunDll32.exe PID 4940 wrote to memory of 4072 4940 rundll32.exe RunDll32.exe PID 4072 wrote to memory of 4588 4072 RunDll32.exe rundll32.exe PID 4072 wrote to memory of 4588 4072 RunDll32.exe rundll32.exe PID 4072 wrote to memory of 4588 4072 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exe"C:\Users\Admin\AppData\Local\Temp\143a7583f333529c748501958018af1802933c380fb1b7c1cd8b448210c74218.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\g9RXZGA.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\g9RXZGA.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\g9RXZGA.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\g9RXZGA.CPl",5⤵
- Loads dropped DLL
PID:4588
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD51befe86390a9a4bb19702128a975af8b
SHA17ce7377a55abe9b11b67c3aa86dcd1775bc52466
SHA25607838d1c21f38b037e375bc9937588e0d3da80bc66b3205e44dc0bc78bf24958
SHA512f3806f31af9babf1700bc059ca7b93ddc6434ae8a2c86592bdbc0b5c15a2f25088c0cecee210363f31e87824487b665096ebec574f6e3b37c58decaef6b5f841
-
Filesize
1.7MB
MD51befe86390a9a4bb19702128a975af8b
SHA17ce7377a55abe9b11b67c3aa86dcd1775bc52466
SHA25607838d1c21f38b037e375bc9937588e0d3da80bc66b3205e44dc0bc78bf24958
SHA512f3806f31af9babf1700bc059ca7b93ddc6434ae8a2c86592bdbc0b5c15a2f25088c0cecee210363f31e87824487b665096ebec574f6e3b37c58decaef6b5f841
-
Filesize
1.7MB
MD51befe86390a9a4bb19702128a975af8b
SHA17ce7377a55abe9b11b67c3aa86dcd1775bc52466
SHA25607838d1c21f38b037e375bc9937588e0d3da80bc66b3205e44dc0bc78bf24958
SHA512f3806f31af9babf1700bc059ca7b93ddc6434ae8a2c86592bdbc0b5c15a2f25088c0cecee210363f31e87824487b665096ebec574f6e3b37c58decaef6b5f841
-
Filesize
1.7MB
MD51befe86390a9a4bb19702128a975af8b
SHA17ce7377a55abe9b11b67c3aa86dcd1775bc52466
SHA25607838d1c21f38b037e375bc9937588e0d3da80bc66b3205e44dc0bc78bf24958
SHA512f3806f31af9babf1700bc059ca7b93ddc6434ae8a2c86592bdbc0b5c15a2f25088c0cecee210363f31e87824487b665096ebec574f6e3b37c58decaef6b5f841
-
Filesize
1.7MB
MD51befe86390a9a4bb19702128a975af8b
SHA17ce7377a55abe9b11b67c3aa86dcd1775bc52466
SHA25607838d1c21f38b037e375bc9937588e0d3da80bc66b3205e44dc0bc78bf24958
SHA512f3806f31af9babf1700bc059ca7b93ddc6434ae8a2c86592bdbc0b5c15a2f25088c0cecee210363f31e87824487b665096ebec574f6e3b37c58decaef6b5f841