Analysis
-
max time kernel
172s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
e2ac8affdf78dc84197eebf5c1df051efcae3101956bd135d02ec79498ba2ada.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e2ac8affdf78dc84197eebf5c1df051efcae3101956bd135d02ec79498ba2ada.dll
Resource
win10v2004-20221111-en
General
-
Target
e2ac8affdf78dc84197eebf5c1df051efcae3101956bd135d02ec79498ba2ada.dll
-
Size
52KB
-
MD5
2bcee96adcf4a10bbdcf5b5df58b1743
-
SHA1
1737da29ea2c6d745eac5ce26f0cd8f11af1bace
-
SHA256
e2ac8affdf78dc84197eebf5c1df051efcae3101956bd135d02ec79498ba2ada
-
SHA512
46ca0cd53a6a79172d5af50e4a8608229dcd68b145286a88257431efaa376f094fd967ab5443c49662fc445f990df6499d52c032df5bfa72a53b403f25a4c78b
-
SSDEEP
768:UyOMccqi3TJq3kQMXrV/Jd8IqTjGqMW5B0QZhd+zPdCunTEDs6LLwhcN:Udbi3E3kvB/Jd89uQUzPdl/RQ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4612 4464 rundll32.exe 23 PID 4464 wrote to memory of 4612 4464 rundll32.exe 23 PID 4464 wrote to memory of 4612 4464 rundll32.exe 23
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2ac8affdf78dc84197eebf5c1df051efcae3101956bd135d02ec79498ba2ada.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e2ac8affdf78dc84197eebf5c1df051efcae3101956bd135d02ec79498ba2ada.dll,#12⤵
- Modifies registry class
PID:4612
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:456