Analysis
-
max time kernel
54s -
max time network
53s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 08:06
Static task
static1
Behavioral task
behavioral1
Sample
fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exe
Resource
win10-20220901-en
General
-
Target
fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exe
-
Size
1.6MB
-
MD5
dd0726d609aef9503c138b881d9aaee2
-
SHA1
1c871511ab0200bf9ae9503483ec1354db21e522
-
SHA256
fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09
-
SHA512
97125986e5b672151dd540cb3383910babc41df72d11a3fd9d75ad648edf7bcdbc43c86ade0807d10ff826bce0ea42ad5006260ae2007a8ab70bbaab19348390
-
SSDEEP
24576:4ry2uXzmVLxtW/BXgJWNnh5F9UPdxVi3wJZiTPEYZe6RWJLODQtcHNSuxd3fcw/3:4un0WJXzNnhDisAJZiwYZvQpu/vz/dz9
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4552 rundll32.exe 4760 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 3512 wrote to memory of 3596 3512 fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exe control.exe PID 3512 wrote to memory of 3596 3512 fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exe control.exe PID 3512 wrote to memory of 3596 3512 fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exe control.exe PID 3596 wrote to memory of 4552 3596 control.exe rundll32.exe PID 3596 wrote to memory of 4552 3596 control.exe rundll32.exe PID 3596 wrote to memory of 4552 3596 control.exe rundll32.exe PID 4552 wrote to memory of 3076 4552 rundll32.exe RunDll32.exe PID 4552 wrote to memory of 3076 4552 rundll32.exe RunDll32.exe PID 3076 wrote to memory of 4760 3076 RunDll32.exe rundll32.exe PID 3076 wrote to memory of 4760 3076 RunDll32.exe rundll32.exe PID 3076 wrote to memory of 4760 3076 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exe"C:\Users\Admin\AppData\Local\Temp\fed042754f65811f3d6caaf6847be23bfffb6c907c575fc29ff360f3237d8e09.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\ZS98f.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\ZS98f.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\ZS98f.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\ZS98f.CPl",5⤵
- Loads dropped DLL
PID:4760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e
-
Filesize
1.7MB
MD52d651abc49d33447713b0fd34f221ae8
SHA1a20738055f2e9e14baec621d9c0f2fee612414ed
SHA256631576338236d320ffffe02311493bad49605b5b93fe7a227888553de26ee35b
SHA512d37ad62467e3bfb0aa39c8e593b53453f4f69868cc5e5f40256d96809410921171edb8882d0749d763538c5ef9a48ffaff7d59da48e8c9412abc856115a17c1e