Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 18:58
Static task
static1
Behavioral task
behavioral1
Sample
4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe
Resource
win10v2004-20220812-en
General
-
Target
4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe
-
Size
88KB
-
MD5
07134df72d2cc71c92f1e529ef777436
-
SHA1
ad9579d47ac6b84a4458f8f82bcd51fd25cb4c3a
-
SHA256
4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895
-
SHA512
5e24abdf256e3fc24caeceb407393cb7bef05d2aa13f618d04be1bcb9f3d85b210cdd342bb26dd8bc0e6f7ce1d6f4a2ed4c9dcd63c2135b7b4742f4e2d167f23
-
SSDEEP
1536:82OimJs5YCdH2eLy19X3BJ+MluLxrETekOq4u0p7AywILXJmrCvu:8hizgwyT3BJ+MQ50ekOqp0F37bJmrv
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
Processes:
rundll32.exerundll32.exepid process 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 2016 rundll32.exe 900 rundll32.exe 900 rundll32.exe 900 rundll32.exe 900 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\EapGLspl = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\SmartmapNotifier\\EapGLspl.dll\",DfrgWeblog WdMobileClock" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 4 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{14c5a437-d64b-4644-8975-3cbb51560358} rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Wow6432Node\CLSID\{14c5a437-d64b-4644-8975-3cbb51560358}\tcpobjSupport = "hVAZp4hKVI76x.nVRm6dX2" rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exerundll32.exedescription pid process target process PID 1048 wrote to memory of 2016 1048 4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe rundll32.exe PID 1048 wrote to memory of 2016 1048 4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe rundll32.exe PID 1048 wrote to memory of 2016 1048 4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe rundll32.exe PID 1048 wrote to memory of 2016 1048 4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe rundll32.exe PID 1048 wrote to memory of 2016 1048 4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe rundll32.exe PID 1048 wrote to memory of 2016 1048 4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe rundll32.exe PID 1048 wrote to memory of 2016 1048 4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe rundll32.exe PID 2016 wrote to memory of 900 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 900 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 900 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 900 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 900 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 900 2016 rundll32.exe rundll32.exe PID 2016 wrote to memory of 900 2016 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe"C:\Users\Admin\AppData\Local\Temp\4259554932fd3c1c38207bd4c1be7481b550cf64b29b71f30b06e5439b680895.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\SyncCommsdlg.dll", DfrgWeblog ClipmapTray2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\SmartmapNotifier\EapGLspl.dll",DfrgWeblog WdMobileClock3⤵
- Loads dropped DLL
PID:900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb
-
Filesize
88KB
MD59a1becb78535db01d8c553fb8e88235d
SHA1535653053ee122cbe79f3ece9ba848e018195379
SHA256245a3d948fb02d9af15da6ecfa22b74f8dc772c03cf26b9a26ec4a2314511753
SHA51246f014e520618118535420a0c4ba0ee3e0a498b2e76472123aee5d6495ad49c20a6a240c1bb588d4bccd520bb02a0f14f6623b3ea05e07771c3ca5f528e8addb