Analysis
-
max time kernel
57s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 04:46
Static task
static1
Behavioral task
behavioral1
Sample
1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe
Resource
win10-20220901-en
General
-
Target
1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe
-
Size
1.7MB
-
MD5
4ba647b78d2cdfdfd7ab3137e808e546
-
SHA1
f714e0d54433ca044e328b0e2a4b894867b96ff2
-
SHA256
1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a
-
SHA512
d3eabd9f9904335ef6b2efe88abafc2216d12139b1d53f3380554911dce78fa6be16812e642cc537022040936432219faefba491d8f37d0d50f782283b0a4bdc
-
SSDEEP
49152:TlBfJXAEG2OOARHfQXujNJsre7L9DgTT4XHUitZa3QS4x7M5dJ+:TlBfKEPUYXusS24XHU8QWxQg
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1964 rundll32.exe 1964 rundll32.exe 1964 rundll32.exe 1964 rundll32.exe 700 rundll32.exe 700 rundll32.exe 700 rundll32.exe 700 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1036 1204 1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe 27 PID 1204 wrote to memory of 1036 1204 1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe 27 PID 1204 wrote to memory of 1036 1204 1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe 27 PID 1204 wrote to memory of 1036 1204 1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe 27 PID 1036 wrote to memory of 1964 1036 control.exe 28 PID 1036 wrote to memory of 1964 1036 control.exe 28 PID 1036 wrote to memory of 1964 1036 control.exe 28 PID 1036 wrote to memory of 1964 1036 control.exe 28 PID 1036 wrote to memory of 1964 1036 control.exe 28 PID 1036 wrote to memory of 1964 1036 control.exe 28 PID 1036 wrote to memory of 1964 1036 control.exe 28 PID 1964 wrote to memory of 836 1964 rundll32.exe 29 PID 1964 wrote to memory of 836 1964 rundll32.exe 29 PID 1964 wrote to memory of 836 1964 rundll32.exe 29 PID 1964 wrote to memory of 836 1964 rundll32.exe 29 PID 836 wrote to memory of 700 836 RunDll32.exe 30 PID 836 wrote to memory of 700 836 RunDll32.exe 30 PID 836 wrote to memory of 700 836 RunDll32.exe 30 PID 836 wrote to memory of 700 836 RunDll32.exe 30 PID 836 wrote to memory of 700 836 RunDll32.exe 30 PID 836 wrote to memory of 700 836 RunDll32.exe 30 PID 836 wrote to memory of 700 836 RunDll32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe"C:\Users\Admin\AppData\Local\Temp\1518df541b6ef7f68d9c5e0528059792d37f542fc8ee49a5b86c1ceb40fb0c6a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\GJB3Wo.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\GJB3Wo.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\GJB3Wo.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\GJB3Wo.CPL",5⤵
- Loads dropped DLL
PID:700
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137
-
Filesize
2.5MB
MD5f99e36767d90adb85a8cedbc9f39ea09
SHA14703c893d1ad97566ba9e9f127add32f0008876b
SHA256233649b3a92983d0d5309ce655e25633c7af83271ec2540847e5c25877536d74
SHA512ec89a384e2eef010e2d2111f077ec90b2dbc31bc1327f7533e3b7184ac731fa7b0e3a41438eecefbaef590983c997a805d98a4690b17d9980316a4744075d137