Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 10:53
Static task
static1
Behavioral task
behavioral1
Sample
e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63.exe
Resource
win10-20220901-en
General
-
Target
e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63.exe
-
Size
1.6MB
-
MD5
624b455fa8d32bd853fe0a96acedee0d
-
SHA1
61d07f5435742bad4d1bfb3de7a130fd744c78ca
-
SHA256
e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63
-
SHA512
e4e056812b0c44ea69692d09dad23815a2b5b22d7d401e6af305851218bd15401b26958b858a43af8eda2dadcef76bf95d7c9c7871365c4d365e8db561fd099d
-
SSDEEP
49152:084cjNkF8p5kxaWd/anrxrtGt0WUmCRzCw0:6cjNackEWd/anKSRz2
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4284 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63.exedescription pid process target process PID 4264 wrote to memory of 4284 4264 e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63.exe regsvr32.exe PID 4264 wrote to memory of 4284 4264 e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63.exe regsvr32.exe PID 4264 wrote to memory of 4284 4264 e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63.exe"C:\Users\Admin\AppData\Local\Temp\e2c314a8b549376ec7d1b31d22c78de3469c96486185f71d2be92a63a5c59d63.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" .\QfYXKWG7.GOt /u /s2⤵
- Loads dropped DLL
PID:4284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD55e0837e8bd27da302aa794c958234922
SHA102acfd5eaaa809f6fc8c8eeb23c953af9e706748
SHA25618519654b49555f5729736e19d64886d8b2572ca4593b1fdeb5e84d86e816b43
SHA51212b4e607bce55151d81d37b58b6563361d2809aff8823f158c690e01446ab69ca6ded0220f2c6913dd3731e2b222ec07c591bba1d63b61cf702953054a4cb257
-
Filesize
1.7MB
MD55e0837e8bd27da302aa794c958234922
SHA102acfd5eaaa809f6fc8c8eeb23c953af9e706748
SHA25618519654b49555f5729736e19d64886d8b2572ca4593b1fdeb5e84d86e816b43
SHA51212b4e607bce55151d81d37b58b6563361d2809aff8823f158c690e01446ab69ca6ded0220f2c6913dd3731e2b222ec07c591bba1d63b61cf702953054a4cb257