Analysis

  • max time kernel
    77s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    24-11-2022 04:17

General

  • Target

    80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe

  • Size

    2.0MB

  • MD5

    3b47c1447a8cbd7460bcd38c883541ea

  • SHA1

    ed1f35d921c9ca2b40ecb160a717e4ad3de40d0b

  • SHA256

    80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899

  • SHA512

    2eaccf2dffb71a0308e0ab86c33afe0fb00cea5a9446825c45876b5b35fb0b655504b71ddd301363166d9ba5fb684066d3233960250848b0c31e46c0a5aaa6ab

  • SSDEEP

    49152:beWh6RBfJXAE6UuakvBX7Yv3ndtEds0cK+6mqakqFE7EhPOgQZ:beWh6RBfKEt417YfndtksIJqeEtQZ

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe
    "C:\Users\Admin\AppData\Local\Temp\80db6f18aaafca59818d88d0dde2fbee7cc6f7e75e76ce673840f2282e069899.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3544
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4828
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL",
            5⤵
            • Loads dropped DLL
            PID:4952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6LBR4QKH.cPL

    Filesize

    1.7MB

    MD5

    50c2c73ee41799d1b11c9a8353ec91b1

    SHA1

    61db869ccc2ad049aac8e9d1e6cced7cde9befba

    SHA256

    df9346a588cf5bfc71f894e29f514985d75d2fc9853c0d90027070f5ad7b5af6

    SHA512

    85a3b08ad197cd2cc4cdbfd355f7847c9b9135cb9803c8a8e39f8029224ca4f0cca6c64c820c96d0e3c9dc361541ee715a6894c4126ad4054c7ac17456a41a60

  • \Users\Admin\AppData\Local\Temp\6LBr4QKH.cpl

    Filesize

    1.7MB

    MD5

    50c2c73ee41799d1b11c9a8353ec91b1

    SHA1

    61db869ccc2ad049aac8e9d1e6cced7cde9befba

    SHA256

    df9346a588cf5bfc71f894e29f514985d75d2fc9853c0d90027070f5ad7b5af6

    SHA512

    85a3b08ad197cd2cc4cdbfd355f7847c9b9135cb9803c8a8e39f8029224ca4f0cca6c64c820c96d0e3c9dc361541ee715a6894c4126ad4054c7ac17456a41a60

  • \Users\Admin\AppData\Local\Temp\6LBr4QKH.cpl

    Filesize

    1.7MB

    MD5

    50c2c73ee41799d1b11c9a8353ec91b1

    SHA1

    61db869ccc2ad049aac8e9d1e6cced7cde9befba

    SHA256

    df9346a588cf5bfc71f894e29f514985d75d2fc9853c0d90027070f5ad7b5af6

    SHA512

    85a3b08ad197cd2cc4cdbfd355f7847c9b9135cb9803c8a8e39f8029224ca4f0cca6c64c820c96d0e3c9dc361541ee715a6894c4126ad4054c7ac17456a41a60

  • memory/2432-150-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-169-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-117-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-118-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-119-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-120-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-121-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-122-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-123-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-124-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-125-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-126-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-127-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-128-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-129-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-130-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-131-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-132-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-133-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-134-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-135-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-136-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-137-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-138-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-139-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-140-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-141-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-142-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-143-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-144-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-145-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-146-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-147-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-148-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-149-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-115-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-152-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-151-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-116-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-155-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-154-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-156-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-157-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-158-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-159-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-160-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-162-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-163-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-161-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-164-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-165-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-166-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-167-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-168-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-153-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-170-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-171-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-172-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-173-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-174-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-175-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/2432-176-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/3544-222-0x0000000000000000-mapping.dmp

  • memory/3544-271-0x0000000005300000-0x000000000540C000-memory.dmp

    Filesize

    1.0MB

  • memory/3544-272-0x0000000005520000-0x000000000562C000-memory.dmp

    Filesize

    1.0MB

  • memory/3544-346-0x0000000005520000-0x000000000562C000-memory.dmp

    Filesize

    1.0MB

  • memory/4092-177-0x0000000000000000-mapping.dmp

  • memory/4092-178-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/4092-179-0x0000000077460000-0x00000000775EE000-memory.dmp

    Filesize

    1.6MB

  • memory/4828-281-0x0000000000000000-mapping.dmp

  • memory/4952-282-0x0000000000000000-mapping.dmp

  • memory/4952-331-0x0000000004FB0000-0x00000000050BC000-memory.dmp

    Filesize

    1.0MB

  • memory/4952-330-0x0000000004D90000-0x0000000004E9C000-memory.dmp

    Filesize

    1.0MB

  • memory/4952-345-0x0000000004FB0000-0x00000000050BC000-memory.dmp

    Filesize

    1.0MB