Analysis
-
max time kernel
70s -
max time network
92s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
23-11-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exe
Resource
win10-20220812-en
General
-
Target
d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exe
-
Size
2.0MB
-
MD5
313a062271c1cedd92e488036f2296d9
-
SHA1
df97fe2e55021dbf59d181d10fbd482e9c925f3e
-
SHA256
d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b
-
SHA512
3b34f44829352386ae80870bef9545c5c541b55e3297a75b3303b4ce6e049a99a109a1a844fb48325988c0e569ef69a8ce8ebfab5a31dc66fec6eeabb960fe29
-
SSDEEP
49152:beWh6RBfJXAE6Umx+QhrBOBw0rontBuhhrIN+NltzR9wS+qSVjs:beWh6RBfKEfQZQe0rotBuOYl398ds
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 4496 rundll32.exe 4528 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 2348 wrote to memory of 3444 2348 d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exe control.exe PID 2348 wrote to memory of 3444 2348 d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exe control.exe PID 2348 wrote to memory of 3444 2348 d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exe control.exe PID 3444 wrote to memory of 4496 3444 control.exe rundll32.exe PID 3444 wrote to memory of 4496 3444 control.exe rundll32.exe PID 3444 wrote to memory of 4496 3444 control.exe rundll32.exe PID 4496 wrote to memory of 2700 4496 rundll32.exe RunDll32.exe PID 4496 wrote to memory of 2700 4496 rundll32.exe RunDll32.exe PID 2700 wrote to memory of 4528 2700 RunDll32.exe rundll32.exe PID 2700 wrote to memory of 4528 2700 RunDll32.exe rundll32.exe PID 2700 wrote to memory of 4528 2700 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exe"C:\Users\Admin\AppData\Local\Temp\d90c57c9c10ea665e9e20a86c6d8125b7f24555ce4fa468360cc5943f4b4c18b.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Sb9igBQ.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Sb9igBQ.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Sb9igBQ.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Sb9igBQ.CPL",5⤵
- Loads dropped DLL
PID:4528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322
-
Filesize
1.7MB
MD563af264ba5eebe084947c753bfbddccc
SHA1cb287c79c5a90fc3ce72c81c3aa1683f0d910de5
SHA25622fbddcd8d7a6190aebc29219a81bfe8f1ba6e4ab216761557ad2caaca71925d
SHA512dbc8bc8cec6b85ac78548c06451bef22425791fada5788db467903d77d7a86b7dc86872bc6957187b323fd6cfbaa1b2e4f22dd14ec92de6bb2167e830fe5d322