Analysis
-
max time kernel
185s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 16:17
Static task
static1
Behavioral task
behavioral1
Sample
7f7772456c9e1753c5f0fe62af64661ac73ab6bfacaac02e388a20105f09afcf.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7f7772456c9e1753c5f0fe62af64661ac73ab6bfacaac02e388a20105f09afcf.dll
Resource
win10v2004-20221111-en
General
-
Target
7f7772456c9e1753c5f0fe62af64661ac73ab6bfacaac02e388a20105f09afcf.dll
-
Size
5.3MB
-
MD5
886e8ca101b91a6f4751ef8ebac6f386
-
SHA1
9624fa47f7acd221bb628a8d8b96edf7ae3a57ae
-
SHA256
7f7772456c9e1753c5f0fe62af64661ac73ab6bfacaac02e388a20105f09afcf
-
SHA512
6684cc120b50898532c74ab2f6c5b40715ff11a1595e293910d95d864c8d646e3f3f0c68ea70e2fdc135dabe694e38a49302a5b6d2ddc14ab66c7632f3bc12c0
-
SSDEEP
98304:bHoup0I2hb4gyQdC9DQwhL3Ing06AUxUXLj1vj7jSmv5yTlpP/:z5z2hboQdALhL3Inmbx0tjiJbP/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Events = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\WIJBFSKT.dll\",_9634694369346" rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
rundll32.exepid process 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe 2344 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
rundll32.exepid process 2344 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 1152 wrote to memory of 2344 1152 rundll32.exe rundll32.exe PID 1152 wrote to memory of 2344 1152 rundll32.exe rundll32.exe PID 1152 wrote to memory of 2344 1152 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f7772456c9e1753c5f0fe62af64661ac73ab6bfacaac02e388a20105f09afcf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7f7772456c9e1753c5f0fe62af64661ac73ab6bfacaac02e388a20105f09afcf.dll,#12⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:2344
-