Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 07:36
Static task
static1
Behavioral task
behavioral1
Sample
57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe
Resource
win10v2004-20220901-en
General
-
Target
57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe
-
Size
1.6MB
-
MD5
5224fc1980b1ac7fd417debaef29877b
-
SHA1
dd9c3a55ebb10012dc1b2fc019354c45cedf4fe6
-
SHA256
57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a
-
SHA512
aae287f633ac70945058568d8b064a9551bef7ec082e100ff9764cc57dcc214b53658a77ce4fe5e6bc0035c7b9646a9d82700dba909d7db7e4ea965159921dfa
-
SSDEEP
24576:4ry2uXzmVLvtW/BXgJWNnh5F9UPdxVi3wJZiTPEYZe6RWJLODQtcHNSuxd3fcw/E:4unOWJXzNnhDisAJZiwYZvQpu/vz/sz9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exepid process 4396 rundll32.exe 4844 rundll32.exe 4844 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 3912 wrote to memory of 2200 3912 57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe control.exe PID 3912 wrote to memory of 2200 3912 57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe control.exe PID 3912 wrote to memory of 2200 3912 57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe control.exe PID 2200 wrote to memory of 4396 2200 control.exe rundll32.exe PID 2200 wrote to memory of 4396 2200 control.exe rundll32.exe PID 2200 wrote to memory of 4396 2200 control.exe rundll32.exe PID 4396 wrote to memory of 4556 4396 rundll32.exe RunDll32.exe PID 4396 wrote to memory of 4556 4396 rundll32.exe RunDll32.exe PID 4556 wrote to memory of 4844 4556 RunDll32.exe rundll32.exe PID 4556 wrote to memory of 4844 4556 RunDll32.exe rundll32.exe PID 4556 wrote to memory of 4844 4556 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe"C:\Users\Admin\AppData\Local\Temp\57665f375bfb67e94c9468677d73d8ba98d741dc680726f4cd6f75cae04cc95a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\ZS98f.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\ZS98f.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\ZS98f.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\ZS98f.CPl",5⤵
- Loads dropped DLL
PID:4844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e