Analysis
-
max time kernel
154s -
max time network
168s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24/11/2022, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1.exe
Resource
win10-20220812-en
General
-
Target
54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1.exe
-
Size
1.8MB
-
MD5
a95d85afba977b18354fd425b8042e20
-
SHA1
add152c38a2c4be0253f78f6d493cfff3de960b3
-
SHA256
54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1
-
SHA512
5e630450afe068feb4e66c7aacb5d7fb6e4eebb4c6ace5f021b626e0e444ed849ba93b40b145dba5527d6cfbbcb7e57b6ad4c7da0e59abfa3a4b0885fcd7b68c
-
SSDEEP
24576:yhvJVJdMf0qkxb5HyyVD59DRuOvkH3e6HbRSC+F2QXHttI0sZdpJAC3MnYNPQ2Mz:C3dke5Hh5EOvkHdHbUCvm/spJDNmL
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4584 rundll32.exe 3204 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings 54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4540 3732 54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1.exe 66 PID 3732 wrote to memory of 4540 3732 54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1.exe 66 PID 3732 wrote to memory of 4540 3732 54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1.exe 66 PID 4540 wrote to memory of 4584 4540 control.exe 68 PID 4540 wrote to memory of 4584 4540 control.exe 68 PID 4540 wrote to memory of 4584 4540 control.exe 68 PID 4584 wrote to memory of 3196 4584 rundll32.exe 69 PID 4584 wrote to memory of 3196 4584 rundll32.exe 69 PID 3196 wrote to memory of 3204 3196 RunDll32.exe 70 PID 3196 wrote to memory of 3204 3196 RunDll32.exe 70 PID 3196 wrote to memory of 3204 3196 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1.exe"C:\Users\Admin\AppData\Local\Temp\54cb65302f8e2b906d17e7df27362058cd1bf9929d7a374eef9012c6bcaeffd1.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\HA4rHJIZ.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HA4rHJIZ.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HA4rHJIZ.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\HA4rHJIZ.cPL",5⤵
- Loads dropped DLL
PID:3204
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54b7a6864f1e71ed9315f817eadf81bc7
SHA1ccd8c7d3b7afa407972e49adc3794629ef7c1aa9
SHA256d19628cc992338c0b1e566312f57a280937f8aec5f70e36f487d03c0cd7aef51
SHA512bc32cdef894df415f5c4aa44663c6cf387c94548b531e978832a6b383104344f1f06f84e8fd3df1cae6772171673d93024b06746c52f3282d7b6b86788604b37
-
Filesize
1.6MB
MD54b7a6864f1e71ed9315f817eadf81bc7
SHA1ccd8c7d3b7afa407972e49adc3794629ef7c1aa9
SHA256d19628cc992338c0b1e566312f57a280937f8aec5f70e36f487d03c0cd7aef51
SHA512bc32cdef894df415f5c4aa44663c6cf387c94548b531e978832a6b383104344f1f06f84e8fd3df1cae6772171673d93024b06746c52f3282d7b6b86788604b37
-
Filesize
1.6MB
MD54b7a6864f1e71ed9315f817eadf81bc7
SHA1ccd8c7d3b7afa407972e49adc3794629ef7c1aa9
SHA256d19628cc992338c0b1e566312f57a280937f8aec5f70e36f487d03c0cd7aef51
SHA512bc32cdef894df415f5c4aa44663c6cf387c94548b531e978832a6b383104344f1f06f84e8fd3df1cae6772171673d93024b06746c52f3282d7b6b86788604b37