Analysis

  • max time kernel
    55s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23-11-2022 09:38

General

  • Target

    8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe

  • Size

    1.6MB

  • MD5

    a8c15a33821a5319394572627157e7ae

  • SHA1

    3e01cfd5a1bb83b2b8d9126e506570278bd59111

  • SHA256

    8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb

  • SHA512

    c44c91b11dd3397c8ffba19966f910350d23c326e9f8adc00b9205b802a6373856ce74330560f880cd89ce82a82bb0e7cc9907c3d9aaed52ec5e82d84247ab5b

  • SSDEEP

    49152:KyxAyPrV/8hcTlHvPmL8iOHpi3yQz2DpZmqzl0:Kyx3rV/8mxPtH43dqpJzu

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe
    "C:\Users\Admin\AppData\Local\Temp\8cfdcf7d503e5a799c14bb6eba62a145953a9671c7f3b2217eebb09ca28350bb.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3496
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\0dafL.CpL",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3580
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0dafL.CpL",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4972
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0dafL.CpL",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3756
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\0dafL.CpL",
            5⤵
            • Loads dropped DLL
            PID:4220

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\0dafL.CpL

    Filesize

    1.7MB

    MD5

    3d2e759dd4dd3b6c1b44c62c9359c34c

    SHA1

    bd36d1f45336a44e03181264d3a284e7b3c856b4

    SHA256

    1d98ef5f6a312107cf28c491df003f392988ee9a35f0b17aa4a5899560ce5d0f

    SHA512

    da11995df795f763e84f2bf8420674703199e70222190367a7351618ef502f9bfd6c0486cc8fb78934d6aabd8796c1c732ea85c283e3557dcf0406a5050755a6

  • \Users\Admin\AppData\Local\Temp\0dafl.cpl

    Filesize

    1.7MB

    MD5

    3d2e759dd4dd3b6c1b44c62c9359c34c

    SHA1

    bd36d1f45336a44e03181264d3a284e7b3c856b4

    SHA256

    1d98ef5f6a312107cf28c491df003f392988ee9a35f0b17aa4a5899560ce5d0f

    SHA512

    da11995df795f763e84f2bf8420674703199e70222190367a7351618ef502f9bfd6c0486cc8fb78934d6aabd8796c1c732ea85c283e3557dcf0406a5050755a6

  • \Users\Admin\AppData\Local\Temp\0dafl.cpl

    Filesize

    1.7MB

    MD5

    3d2e759dd4dd3b6c1b44c62c9359c34c

    SHA1

    bd36d1f45336a44e03181264d3a284e7b3c856b4

    SHA256

    1d98ef5f6a312107cf28c491df003f392988ee9a35f0b17aa4a5899560ce5d0f

    SHA512

    da11995df795f763e84f2bf8420674703199e70222190367a7351618ef502f9bfd6c0486cc8fb78934d6aabd8796c1c732ea85c283e3557dcf0406a5050755a6

  • memory/3496-154-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-173-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-119-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-120-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-122-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-123-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-125-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-126-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-127-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-128-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-129-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-130-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-131-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-132-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-133-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-134-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-135-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-136-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-137-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-138-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-139-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-140-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-141-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-142-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-143-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-144-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-145-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-146-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-147-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-148-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-149-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-150-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-151-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-152-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-153-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-117-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-157-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-155-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-118-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-158-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-159-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-160-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-161-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-162-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-163-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-164-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-165-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-166-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-167-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-168-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-170-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-171-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-169-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-172-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-156-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-175-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-174-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-177-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-176-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-178-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-180-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-179-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-181-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3496-182-0x00000000771E0000-0x000000007736E000-memory.dmp

    Filesize

    1.6MB

  • memory/3580-183-0x0000000000000000-mapping.dmp

  • memory/3756-285-0x0000000000000000-mapping.dmp

  • memory/4220-286-0x0000000000000000-mapping.dmp

  • memory/4220-334-0x0000000004FC0000-0x00000000050D5000-memory.dmp

    Filesize

    1.1MB

  • memory/4220-333-0x0000000004D60000-0x0000000004E9B000-memory.dmp

    Filesize

    1.2MB

  • memory/4220-342-0x0000000004FC0000-0x00000000050D5000-memory.dmp

    Filesize

    1.1MB

  • memory/4972-228-0x0000000000000000-mapping.dmp

  • memory/4972-276-0x00000000051A0000-0x00000000052DB000-memory.dmp

    Filesize

    1.2MB

  • memory/4972-277-0x0000000005400000-0x0000000005515000-memory.dmp

    Filesize

    1.1MB

  • memory/4972-343-0x0000000005400000-0x0000000005515000-memory.dmp

    Filesize

    1.1MB