Analysis
-
max time kernel
202s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 12:49
Behavioral task
behavioral1
Sample
41cddd93895d9a4a366745b94368e50525f929c8b6afb7cb997cd9836c1832f0.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
41cddd93895d9a4a366745b94368e50525f929c8b6afb7cb997cd9836c1832f0.dll
Resource
win10v2004-20221111-en
General
-
Target
41cddd93895d9a4a366745b94368e50525f929c8b6afb7cb997cd9836c1832f0.dll
-
Size
13KB
-
MD5
c9d32dc75c5813d881d5321b29ff3f56
-
SHA1
f4fd38189d298bf2723b1b51fbd2d976719fd26d
-
SHA256
41cddd93895d9a4a366745b94368e50525f929c8b6afb7cb997cd9836c1832f0
-
SHA512
27f56aa7498395f7b214cf8d6e8906c866e9690dc73fbe353cb9c0c100c40124681d1f7f2e7cdf582229890983f1c01fe4df6f62601f8c603b07c3074e7c90ec
-
SSDEEP
384:X/2gC2RDLW9UXntTOW4GfAxXr6+Y9PffPz:LC2RDiKXt6W4GYxWbPr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 844 msedge.exe 844 msedge.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 1476 4688 rundll32.exe 80 PID 4688 wrote to memory of 1476 4688 rundll32.exe 80 PID 4688 wrote to memory of 1476 4688 rundll32.exe 80 PID 1476 wrote to memory of 2176 1476 rundll32.exe 82 PID 1476 wrote to memory of 2176 1476 rundll32.exe 82 PID 1476 wrote to memory of 2176 1476 rundll32.exe 82 PID 2176 wrote to memory of 1612 2176 cmd.exe 86 PID 2176 wrote to memory of 1612 2176 cmd.exe 86 PID 1612 wrote to memory of 4284 1612 msedge.exe 89 PID 1612 wrote to memory of 4284 1612 msedge.exe 89 PID 1476 wrote to memory of 4800 1476 rundll32.exe 91 PID 1476 wrote to memory of 4800 1476 rundll32.exe 91 PID 1476 wrote to memory of 4800 1476 rundll32.exe 91 PID 4800 wrote to memory of 2392 4800 cmd.exe 93 PID 4800 wrote to memory of 2392 4800 cmd.exe 93 PID 4800 wrote to memory of 2392 4800 cmd.exe 93 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 4456 1612 msedge.exe 97 PID 1612 wrote to memory of 844 1612 msedge.exe 98 PID 1612 wrote to memory of 844 1612 msedge.exe 98 PID 1612 wrote to memory of 3448 1612 msedge.exe 99 PID 1612 wrote to memory of 3448 1612 msedge.exe 99 PID 1612 wrote to memory of 3448 1612 msedge.exe 99 PID 1612 wrote to memory of 3448 1612 msedge.exe 99 PID 1612 wrote to memory of 3448 1612 msedge.exe 99 PID 1612 wrote to memory of 3448 1612 msedge.exe 99
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41cddd93895d9a4a366745b94368e50525f929c8b6afb7cb997cd9836c1832f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41cddd93895d9a4a366745b94368e50525f929c8b6afb7cb997cd9836c1832f0.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start www.facebook.com/1000037242812563⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.facebook.com/1000037242812564⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x118,0x128,0x7ff8969c46f8,0x7ff8969c4708,0x7ff8969c47185⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14264082146779478969,18008950973436567225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:25⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14264082146779478969,18008950973436567225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14264082146779478969,18008950973436567225,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:85⤵PID:3448
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start3⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.execmd.exe4⤵PID:2392
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4692