Analysis
-
max time kernel
66s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 12:23
Static task
static1
Behavioral task
behavioral1
Sample
4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592.exe
Resource
win10-20220901-en
General
-
Target
4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592.exe
-
Size
1.7MB
-
MD5
01b2678d0cfe3601334c8ed2afad3db2
-
SHA1
6d9e5bba4113d72812520eacb781e89686be7df0
-
SHA256
4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592
-
SHA512
c3e7c879347ff14368d0a44f81a49e6ee55546437a31f3df46a22b4b5e8d390da74ba53010fd9a73f9785145a3932ead144db26c9f3eaac9b5cf86d503144ed3
-
SSDEEP
49152:KyjvFEmpicdDfdOConxZ7Vk/vp5Q/pl7G9Jq+C:KyjvFEcicdDfdabZunQ/f7G3q+C
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exepid process 3532 regsvr32.exe 3532 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592.exedescription pid process target process PID 3068 wrote to memory of 3532 3068 4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592.exe regsvr32.exe PID 3068 wrote to memory of 3532 3068 4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592.exe regsvr32.exe PID 3068 wrote to memory of 3532 3068 4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592.exe regsvr32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592.exe"C:\Users\Admin\AppData\Local\Temp\4b46da541010e043253421db4f5539b18312e62a88c3ce0bdf54f7e371a60592.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -u GMLMCPMT.DaX -S2⤵
- Loads dropped DLL
PID:3532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD583268add0dad538e2bf6fdd8641f81b7
SHA12d21361dc3ce43a218cb1a9a74d5271cac4d34ef
SHA2563882062f05153a285a66078d33d1beca0a0fc94d955a1ed385846193d5f4e03c
SHA512e4e8368f69b55db8e25c83d9606c081beb34494a754a28b3a24eb2257977ab3179262f6de7c9a24a38bfb71828cadd78a411ef7efbe07cd67b0d25783200aaf6
-
Filesize
1.7MB
MD583268add0dad538e2bf6fdd8641f81b7
SHA12d21361dc3ce43a218cb1a9a74d5271cac4d34ef
SHA2563882062f05153a285a66078d33d1beca0a0fc94d955a1ed385846193d5f4e03c
SHA512e4e8368f69b55db8e25c83d9606c081beb34494a754a28b3a24eb2257977ab3179262f6de7c9a24a38bfb71828cadd78a411ef7efbe07cd67b0d25783200aaf6
-
Filesize
1.7MB
MD583268add0dad538e2bf6fdd8641f81b7
SHA12d21361dc3ce43a218cb1a9a74d5271cac4d34ef
SHA2563882062f05153a285a66078d33d1beca0a0fc94d955a1ed385846193d5f4e03c
SHA512e4e8368f69b55db8e25c83d9606c081beb34494a754a28b3a24eb2257977ab3179262f6de7c9a24a38bfb71828cadd78a411ef7efbe07cd67b0d25783200aaf6