Analysis
-
max time kernel
77s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24-11-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe
Resource
win10-20220812-en
General
-
Target
80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe
-
Size
2.0MB
-
MD5
3b47c1447a8cbd7460bcd38c883541ea
-
SHA1
ed1f35d921c9ca2b40ecb160a717e4ad3de40d0b
-
SHA256
80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899
-
SHA512
2eaccf2dffb71a0308e0ab86c33afe0fb00cea5a9446825c45876b5b35fb0b655504b71ddd301363166d9ba5fb684066d3233960250848b0c31e46c0a5aaa6ab
-
SSDEEP
49152:beWh6RBfJXAE6UuakvBX7Yv3ndtEds0cK+6mqakqFE7EhPOgQZ:beWh6RBfKEt417YfndtksIJqeEtQZ
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3544 rundll32.exe 4952 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings 80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 2432 wrote to memory of 4092 2432 80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe control.exe PID 2432 wrote to memory of 4092 2432 80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe control.exe PID 2432 wrote to memory of 4092 2432 80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe control.exe PID 4092 wrote to memory of 3544 4092 control.exe rundll32.exe PID 4092 wrote to memory of 3544 4092 control.exe rundll32.exe PID 4092 wrote to memory of 3544 4092 control.exe rundll32.exe PID 3544 wrote to memory of 4828 3544 rundll32.exe RunDll32.exe PID 3544 wrote to memory of 4828 3544 rundll32.exe RunDll32.exe PID 4828 wrote to memory of 4952 4828 RunDll32.exe rundll32.exe PID 4828 wrote to memory of 4952 4828 RunDll32.exe rundll32.exe PID 4828 wrote to memory of 4952 4828 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe"C:\Users\Admin\AppData\Local\Temp\80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL",5⤵
- Loads dropped DLL
PID:4952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD550c2c73ee41799d1b11c9a8353ec91b1
SHA161db869ccc2ad049aac8e9d1e6cced7cde9befba
SHA256df9346a588cf5bfc71f894e29f514985d75d2fc9853c0d90027070f5ad7b5af6
SHA51285a3b08ad197cd2cc4cdbfd355f7847c9b9135cb9803c8a8e39f8029224ca4f0cca6c64c820c96d0e3c9dc361541ee715a6894c4126ad4054c7ac17456a41a60
-
Filesize
1.7MB
MD550c2c73ee41799d1b11c9a8353ec91b1
SHA161db869ccc2ad049aac8e9d1e6cced7cde9befba
SHA256df9346a588cf5bfc71f894e29f514985d75d2fc9853c0d90027070f5ad7b5af6
SHA51285a3b08ad197cd2cc4cdbfd355f7847c9b9135cb9803c8a8e39f8029224ca4f0cca6c64c820c96d0e3c9dc361541ee715a6894c4126ad4054c7ac17456a41a60
-
Filesize
1.7MB
MD550c2c73ee41799d1b11c9a8353ec91b1
SHA161db869ccc2ad049aac8e9d1e6cced7cde9befba
SHA256df9346a588cf5bfc71f894e29f514985d75d2fc9853c0d90027070f5ad7b5af6
SHA51285a3b08ad197cd2cc4cdbfd355f7847c9b9135cb9803c8a8e39f8029224ca4f0cca6c64c820c96d0e3c9dc361541ee715a6894c4126ad4054c7ac17456a41a60