Analysis
-
max time kernel
121s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe
Resource
win10v2004-20220812-en
General
-
Target
ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe
-
Size
1.7MB
-
MD5
2f183560b5ea544574d4767568b29bb0
-
SHA1
772e68086d339526fc4f5d57adf64804c028ddec
-
SHA256
ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad
-
SHA512
192e2ab01cf1d040e5fb863052ec8492a3c0deeaf0dd6a1cafa1799fcd8aafdda587bfb77cf70659dd8989ed3c84ef491ab3016528ec6b64df9a5a8347519f88
-
SSDEEP
49152:zunH3/PUf0y26inrMc68NIDxdfxnIMSntZ5VkTbqJpljav:zKH33Uf0y26socFNIDxdfxnEv7Wopp2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exerundll32.exepid process 4824 rundll32.exe 1708 rundll32.exe 1708 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 1168 wrote to memory of 4308 1168 ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe control.exe PID 1168 wrote to memory of 4308 1168 ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe control.exe PID 1168 wrote to memory of 4308 1168 ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe control.exe PID 4308 wrote to memory of 4824 4308 control.exe rundll32.exe PID 4308 wrote to memory of 4824 4308 control.exe rundll32.exe PID 4308 wrote to memory of 4824 4308 control.exe rundll32.exe PID 4824 wrote to memory of 2356 4824 rundll32.exe RunDll32.exe PID 4824 wrote to memory of 2356 4824 rundll32.exe RunDll32.exe PID 2356 wrote to memory of 1708 2356 RunDll32.exe rundll32.exe PID 2356 wrote to memory of 1708 2356 RunDll32.exe rundll32.exe PID 2356 wrote to memory of 1708 2356 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe"C:\Users\Admin\AppData\Local\Temp\ac10e8410f881edb39644be80a8269638de2feaf1068f61f079ff8aac971c9ad.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\DNknEOHK.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DNknEOHK.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DNknEOHK.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\DNknEOHK.cpl",5⤵
- Loads dropped DLL
PID:1708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5da8de540d6d685c9d099145a3ac44ec1
SHA1f8ddfb3170a257d9df5381773ee8fa8a3b83f0b0
SHA2564961a725ff7cf647400cf3bd39fc1c35c384ec09dc1226536d8c436321bce616
SHA512b504c3585ac752b86007a830a8dc715eb5c4542a3115a035d1812f80756d1ca831810be3510db40b6ed6020c922a3e6b0276e868932147a8d2bcc680538dfc7a
-
Filesize
1.7MB
MD5da8de540d6d685c9d099145a3ac44ec1
SHA1f8ddfb3170a257d9df5381773ee8fa8a3b83f0b0
SHA2564961a725ff7cf647400cf3bd39fc1c35c384ec09dc1226536d8c436321bce616
SHA512b504c3585ac752b86007a830a8dc715eb5c4542a3115a035d1812f80756d1ca831810be3510db40b6ed6020c922a3e6b0276e868932147a8d2bcc680538dfc7a
-
Filesize
1.7MB
MD5da8de540d6d685c9d099145a3ac44ec1
SHA1f8ddfb3170a257d9df5381773ee8fa8a3b83f0b0
SHA2564961a725ff7cf647400cf3bd39fc1c35c384ec09dc1226536d8c436321bce616
SHA512b504c3585ac752b86007a830a8dc715eb5c4542a3115a035d1812f80756d1ca831810be3510db40b6ed6020c922a3e6b0276e868932147a8d2bcc680538dfc7a
-
Filesize
1.7MB
MD5da8de540d6d685c9d099145a3ac44ec1
SHA1f8ddfb3170a257d9df5381773ee8fa8a3b83f0b0
SHA2564961a725ff7cf647400cf3bd39fc1c35c384ec09dc1226536d8c436321bce616
SHA512b504c3585ac752b86007a830a8dc715eb5c4542a3115a035d1812f80756d1ca831810be3510db40b6ed6020c922a3e6b0276e868932147a8d2bcc680538dfc7a