Analysis
-
max time kernel
75s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 06:08
Static task
static1
Behavioral task
behavioral1
Sample
44e809364c31f0155c24215967d660132b339465ce59b9d0e60066cdf0ba0b2b.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
44e809364c31f0155c24215967d660132b339465ce59b9d0e60066cdf0ba0b2b.dll
Resource
win10v2004-20220901-en
General
-
Target
44e809364c31f0155c24215967d660132b339465ce59b9d0e60066cdf0ba0b2b.dll
-
Size
52KB
-
MD5
b536add2bc138c7e7903fd9fb31c8d63
-
SHA1
713869c378ae512c00eb66f3432b4080d4292b3c
-
SHA256
44e809364c31f0155c24215967d660132b339465ce59b9d0e60066cdf0ba0b2b
-
SHA512
25a10e30033160a523df8472a7981f1c203966030a93ac3c7598d65fd9b3c3bef8919fb2fdf12a2fff0eafda74caa9e594d637583100d2774a6356cbea3ee568
-
SSDEEP
768:UyOMccqi3TJq3kQMXrV/Jd8IqTjGqMW5B0QZhd+zPdCunTEDs6LLwhc5:Udbi3E3kvB/Jd89uQUzPdl/RI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4100 3248 rundll32.exe 82 PID 3248 wrote to memory of 4100 3248 rundll32.exe 82 PID 3248 wrote to memory of 4100 3248 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44e809364c31f0155c24215967d660132b339465ce59b9d0e60066cdf0ba0b2b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\44e809364c31f0155c24215967d660132b339465ce59b9d0e60066cdf0ba0b2b.dll,#12⤵
- Modifies registry class
PID:4100
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:204