Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 12:14
Static task
static1
Behavioral task
behavioral1
Sample
44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe
Resource
win10v2004-20221111-en
General
-
Target
44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe
-
Size
1.8MB
-
MD5
77ccebca0e61c152015429d2f27ed0ae
-
SHA1
e6b3a971679ebb810844ac2e3e1b6c1dc8e9df80
-
SHA256
44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade
-
SHA512
ca2ff71f8bc9e553c6374d75943a056b66480fa0c4a0c5bf3ea6a5d02bb9f2b7cd867ced5aa01bc3c547cfecd7a0a839b9fa4cb2001c311bb33acc066e938b92
-
SSDEEP
24576:5HLmCiIhiXQtTezW2KN1PD5zqlKjltlJyQTNVHbvtpdf8D7LcUYmyVQTDaZjbezU:qYTez4PpTLXnvdf8D7LvbTCj6TU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\Control Panel\International\Geo\Nation 44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exepid process 2484 rundll32.exe 996 rundll32.exe 996 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000_Classes\Local Settings 44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 3344 wrote to memory of 3532 3344 44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe control.exe PID 3344 wrote to memory of 3532 3344 44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe control.exe PID 3344 wrote to memory of 3532 3344 44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe control.exe PID 3532 wrote to memory of 2484 3532 control.exe rundll32.exe PID 3532 wrote to memory of 2484 3532 control.exe rundll32.exe PID 3532 wrote to memory of 2484 3532 control.exe rundll32.exe PID 2484 wrote to memory of 3400 2484 rundll32.exe RunDll32.exe PID 2484 wrote to memory of 3400 2484 rundll32.exe RunDll32.exe PID 3400 wrote to memory of 996 3400 RunDll32.exe rundll32.exe PID 3400 wrote to memory of 996 3400 RunDll32.exe rundll32.exe PID 3400 wrote to memory of 996 3400 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe"C:\Users\Admin\AppData\Local\Temp\44433cb374794383b86e826326e5b48d712c4e0e9144273c85e5de8b8bd51ade.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\LBWH.cpL",2⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\LBWH.cpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\LBWH.cpL",4⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\LBWH.cpL",5⤵
- Loads dropped DLL
PID:996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD56288e5cbe9189ddad8fa7984d8b90a17
SHA1775aa4b846b91ca2d352f0b7c81192dd4db17105
SHA25664d65f25f51552437d89c6901c9fc44b289817fda14fff76fb5243fc6c11132c
SHA512f2eb7407b92b7cd129a80080e7b88d72ce959756efbfe22932fda3431dba16ddc975059707cb48dd72be062f0439add610fbe447655f9c6ea3ea8480935422b5
-
Filesize
1.7MB
MD56288e5cbe9189ddad8fa7984d8b90a17
SHA1775aa4b846b91ca2d352f0b7c81192dd4db17105
SHA25664d65f25f51552437d89c6901c9fc44b289817fda14fff76fb5243fc6c11132c
SHA512f2eb7407b92b7cd129a80080e7b88d72ce959756efbfe22932fda3431dba16ddc975059707cb48dd72be062f0439add610fbe447655f9c6ea3ea8480935422b5
-
Filesize
1.7MB
MD56288e5cbe9189ddad8fa7984d8b90a17
SHA1775aa4b846b91ca2d352f0b7c81192dd4db17105
SHA25664d65f25f51552437d89c6901c9fc44b289817fda14fff76fb5243fc6c11132c
SHA512f2eb7407b92b7cd129a80080e7b88d72ce959756efbfe22932fda3431dba16ddc975059707cb48dd72be062f0439add610fbe447655f9c6ea3ea8480935422b5
-
Filesize
1.7MB
MD56288e5cbe9189ddad8fa7984d8b90a17
SHA1775aa4b846b91ca2d352f0b7c81192dd4db17105
SHA25664d65f25f51552437d89c6901c9fc44b289817fda14fff76fb5243fc6c11132c
SHA512f2eb7407b92b7cd129a80080e7b88d72ce959756efbfe22932fda3431dba16ddc975059707cb48dd72be062f0439add610fbe447655f9c6ea3ea8480935422b5