Analysis
-
max time kernel
16s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 16:41
Static task
static1
Behavioral task
behavioral1
Sample
b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe
Resource
win10v2004-20221111-en
General
-
Target
b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe
-
Size
171KB
-
MD5
db7f7a538f8cd5804bfc676c4418390c
-
SHA1
229e8cdba95a0c61ab1737fdb2e89854c69f4b0f
-
SHA256
b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254
-
SHA512
a7f7795bca7678fcebbb9be0e4ee75176e3778ae7bcc7a2f181532476c8032ee282bffc598778c586d912c7f2ae3da81d28aacd41ab0bfd715da5cd225ed3f84
-
SSDEEP
3072:DQIURTXJ+MXu4KVzxyb+EmjplSAO4/GUkhg40fkHFmJ3jB:Ds9e4KVQipf84/Mhg4CyFU3N
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe 1336 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe = "Rundll32.exe C:\\Users\\Admin\\AppData\\Local\\Adobe\\rnpzvfmr.dll,DllCanUnloadNow" rundll32.exe Key created \Registry\User\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
rundll32.exeRundll32.exepid process 1336 rundll32.exe 1600 Rundll32.exe 1600 Rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Rundll32.exepid process 1600 Rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exerundll32.exedescription pid process target process PID 1156 wrote to memory of 1336 1156 b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe rundll32.exe PID 1156 wrote to memory of 1336 1156 b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe rundll32.exe PID 1156 wrote to memory of 1336 1156 b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe rundll32.exe PID 1156 wrote to memory of 1336 1156 b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe rundll32.exe PID 1156 wrote to memory of 1336 1156 b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe rundll32.exe PID 1156 wrote to memory of 1336 1156 b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe rundll32.exe PID 1156 wrote to memory of 1336 1156 b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe rundll32.exe PID 1336 wrote to memory of 1600 1336 rundll32.exe Rundll32.exe PID 1336 wrote to memory of 1600 1336 rundll32.exe Rundll32.exe PID 1336 wrote to memory of 1600 1336 rundll32.exe Rundll32.exe PID 1336 wrote to memory of 1600 1336 rundll32.exe Rundll32.exe PID 1336 wrote to memory of 1600 1336 rundll32.exe Rundll32.exe PID 1336 wrote to memory of 1600 1336 rundll32.exe Rundll32.exe PID 1336 wrote to memory of 1600 1336 rundll32.exe Rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe"C:\Users\Admin\AppData\Local\Temp\b78302e5cf2569340dba94ada514f6afd5485d32e8e6bd1d872376ab63677254.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\nsoB0BC.tmp\qxmtubdn.dll",DllCanUnloadNow2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Adobe\rnpzvfmr.dll,DllCanUnloadNow3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1600
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nsoB0BC.tmp\qxmtubdn.dllFilesize
364KB
MD5b3d890446fa7a0b4513f7c18955201d5
SHA1ca22e3a4883e932cf4884216291e1b2e9ca1d8c4
SHA25611d0981a537bd801f59fe42fc94f2e58d7f400dc3fe169ede9202e09940c5cf5
SHA51278a82d75182e732f07882e18c2dbbbc302fa47c251d4732ba6b97203939b0ed4739c33d5b8861de2d80573df94d3366969c11ddb2a7c333f4c2b44cb696c7991
-
\Users\Admin\AppData\Local\Temp\nsoB0BC.tmp\qxmtubdn.dllFilesize
364KB
MD5b3d890446fa7a0b4513f7c18955201d5
SHA1ca22e3a4883e932cf4884216291e1b2e9ca1d8c4
SHA25611d0981a537bd801f59fe42fc94f2e58d7f400dc3fe169ede9202e09940c5cf5
SHA51278a82d75182e732f07882e18c2dbbbc302fa47c251d4732ba6b97203939b0ed4739c33d5b8861de2d80573df94d3366969c11ddb2a7c333f4c2b44cb696c7991
-
\Users\Admin\AppData\Local\Temp\nsoB0BC.tmp\qxmtubdn.dllFilesize
364KB
MD5b3d890446fa7a0b4513f7c18955201d5
SHA1ca22e3a4883e932cf4884216291e1b2e9ca1d8c4
SHA25611d0981a537bd801f59fe42fc94f2e58d7f400dc3fe169ede9202e09940c5cf5
SHA51278a82d75182e732f07882e18c2dbbbc302fa47c251d4732ba6b97203939b0ed4739c33d5b8861de2d80573df94d3366969c11ddb2a7c333f4c2b44cb696c7991
-
\Users\Admin\AppData\Local\Temp\nsoB0BC.tmp\qxmtubdn.dllFilesize
364KB
MD5b3d890446fa7a0b4513f7c18955201d5
SHA1ca22e3a4883e932cf4884216291e1b2e9ca1d8c4
SHA25611d0981a537bd801f59fe42fc94f2e58d7f400dc3fe169ede9202e09940c5cf5
SHA51278a82d75182e732f07882e18c2dbbbc302fa47c251d4732ba6b97203939b0ed4739c33d5b8861de2d80573df94d3366969c11ddb2a7c333f4c2b44cb696c7991
-
\Users\Admin\AppData\Local\Temp\nsoB0BC.tmp\qxmtubdn.dllFilesize
364KB
MD5b3d890446fa7a0b4513f7c18955201d5
SHA1ca22e3a4883e932cf4884216291e1b2e9ca1d8c4
SHA25611d0981a537bd801f59fe42fc94f2e58d7f400dc3fe169ede9202e09940c5cf5
SHA51278a82d75182e732f07882e18c2dbbbc302fa47c251d4732ba6b97203939b0ed4739c33d5b8861de2d80573df94d3366969c11ddb2a7c333f4c2b44cb696c7991
-
memory/1156-54-0x0000000075091000-0x0000000075093000-memory.dmpFilesize
8KB
-
memory/1336-55-0x0000000000000000-mapping.dmp
-
memory/1600-62-0x0000000000000000-mapping.dmp
-
memory/1600-64-0x0000000010000000-0x000000001005D000-memory.dmpFilesize
372KB