Analysis
-
max time kernel
55s -
max time network
64s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 09:38
Static task
static1
Behavioral task
behavioral1
Sample
8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe
Resource
win10-20220901-en
General
-
Target
8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe
-
Size
1.6MB
-
MD5
a8c15a33821a5319394572627157e7ae
-
SHA1
3e01cfd5a1bb83b2b8d9126e506570278bd59111
-
SHA256
8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb
-
SHA512
c44c91b11dd3397c8ffba19966f910350d23c326e9f8adc00b9205b802a6373856ce74330560f880cd89ce82a82bb0e7cc9907c3d9aaed52ec5e82d84247ab5b
-
SSDEEP
49152:KyxAyPrV/8hcTlHvPmL8iOHpi3yQz2DpZmqzl0:Kyx3rV/8mxPtH43dqpJzu
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4972 rundll32.exe 4220 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings 8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 3496 wrote to memory of 3580 3496 8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe control.exe PID 3496 wrote to memory of 3580 3496 8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe control.exe PID 3496 wrote to memory of 3580 3496 8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe control.exe PID 3580 wrote to memory of 4972 3580 control.exe rundll32.exe PID 3580 wrote to memory of 4972 3580 control.exe rundll32.exe PID 3580 wrote to memory of 4972 3580 control.exe rundll32.exe PID 4972 wrote to memory of 3756 4972 rundll32.exe RunDll32.exe PID 4972 wrote to memory of 3756 4972 rundll32.exe RunDll32.exe PID 3756 wrote to memory of 4220 3756 RunDll32.exe rundll32.exe PID 3756 wrote to memory of 4220 3756 RunDll32.exe rundll32.exe PID 3756 wrote to memory of 4220 3756 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe"C:\Users\Admin\AppData\Local\Temp\8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\0dafL.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0dafL.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0dafL.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\0dafL.CpL",5⤵
- Loads dropped DLL
PID:4220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD53d2e759dd4dd3b6c1b44c62c9359c34c
SHA1bd36d1f45336a44e03181264d3a284e7b3c856b4
SHA2561d98ef5f6a312107cf28c491df003f392988ee9a35f0b17aa4a5899560ce5d0f
SHA512da11995df795f763e84f2bf8420674703199e70222190367a7351618ef502f9bfd6c0486cc8fb78934d6aabd8796c1c732ea85c283e3557dcf0406a5050755a6
-
Filesize
1.7MB
MD53d2e759dd4dd3b6c1b44c62c9359c34c
SHA1bd36d1f45336a44e03181264d3a284e7b3c856b4
SHA2561d98ef5f6a312107cf28c491df003f392988ee9a35f0b17aa4a5899560ce5d0f
SHA512da11995df795f763e84f2bf8420674703199e70222190367a7351618ef502f9bfd6c0486cc8fb78934d6aabd8796c1c732ea85c283e3557dcf0406a5050755a6
-
Filesize
1.7MB
MD53d2e759dd4dd3b6c1b44c62c9359c34c
SHA1bd36d1f45336a44e03181264d3a284e7b3c856b4
SHA2561d98ef5f6a312107cf28c491df003f392988ee9a35f0b17aa4a5899560ce5d0f
SHA512da11995df795f763e84f2bf8420674703199e70222190367a7351618ef502f9bfd6c0486cc8fb78934d6aabd8796c1c732ea85c283e3557dcf0406a5050755a6