Analysis
-
max time kernel
64s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 12:34
Static task
static1
Behavioral task
behavioral1
Sample
8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exe
Resource
win10-20220901-en
General
-
Target
8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exe
-
Size
2.0MB
-
MD5
38fa9ca9e2ca12e844095b36e3a3eb74
-
SHA1
2df8c040ccb9c38c55d6ada65f782cc23b0a6f29
-
SHA256
8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5
-
SHA512
01e3dcc36817f4b305f15da8e48b3873544b3ec18c5bd993fd74b8d521396a3492adbe919dc2a8fc085ffae6f147ed2522dbd7f91f886ed0344018347c1b0bf5
-
SSDEEP
49152:/eZBYBfJXAE3p5qHKwDpH1C0dlqDIZj06xRRtOmQ7i5wGS0:/eZBYBfKEZ5qHKwDpH1C0nq6Jf+mHpD
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exepid process 3508 rundll32.exe 3896 rundll32.exe 3896 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings 8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 2840 wrote to memory of 4912 2840 8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exe control.exe PID 2840 wrote to memory of 4912 2840 8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exe control.exe PID 2840 wrote to memory of 4912 2840 8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exe control.exe PID 4912 wrote to memory of 3508 4912 control.exe rundll32.exe PID 4912 wrote to memory of 3508 4912 control.exe rundll32.exe PID 4912 wrote to memory of 3508 4912 control.exe rundll32.exe PID 3508 wrote to memory of 3760 3508 rundll32.exe RunDll32.exe PID 3508 wrote to memory of 3760 3508 rundll32.exe RunDll32.exe PID 3760 wrote to memory of 3896 3760 RunDll32.exe rundll32.exe PID 3760 wrote to memory of 3896 3760 RunDll32.exe rundll32.exe PID 3760 wrote to memory of 3896 3760 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exe"C:\Users\Admin\AppData\Local\Temp\8f122ad5e04816bddc1697bcebe999f209b192fdda77cd3f9411fba6df5830d5.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\BlKTyY.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BlKTyY.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BlKTyY.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\BlKTyY.cPL",5⤵
- Loads dropped DLL
PID:3896
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5a7ac7f7d5d526029e5c5aae8022b871b
SHA1969257456a94e60a814f4dfb96e808705a3a3b35
SHA256deb2562b14edd8709922594c3e79d3ce800cf593591eec182d67616a2f5c2a46
SHA5122de877acf98d770c3861be4e616c7c9da97df9512e8d1984414b13cf308025b61be41613cd8db9edabda0429d0740dd4574eebcfce344f2c00997f899d5be17b
-
Filesize
1.7MB
MD5a7ac7f7d5d526029e5c5aae8022b871b
SHA1969257456a94e60a814f4dfb96e808705a3a3b35
SHA256deb2562b14edd8709922594c3e79d3ce800cf593591eec182d67616a2f5c2a46
SHA5122de877acf98d770c3861be4e616c7c9da97df9512e8d1984414b13cf308025b61be41613cd8db9edabda0429d0740dd4574eebcfce344f2c00997f899d5be17b
-
Filesize
1.7MB
MD5a7ac7f7d5d526029e5c5aae8022b871b
SHA1969257456a94e60a814f4dfb96e808705a3a3b35
SHA256deb2562b14edd8709922594c3e79d3ce800cf593591eec182d67616a2f5c2a46
SHA5122de877acf98d770c3861be4e616c7c9da97df9512e8d1984414b13cf308025b61be41613cd8db9edabda0429d0740dd4574eebcfce344f2c00997f899d5be17b
-
Filesize
1.7MB
MD5a7ac7f7d5d526029e5c5aae8022b871b
SHA1969257456a94e60a814f4dfb96e808705a3a3b35
SHA256deb2562b14edd8709922594c3e79d3ce800cf593591eec182d67616a2f5c2a46
SHA5122de877acf98d770c3861be4e616c7c9da97df9512e8d1984414b13cf308025b61be41613cd8db9edabda0429d0740dd4574eebcfce344f2c00997f899d5be17b