Analysis
-
max time kernel
161s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 16:01
Static task
static1
Behavioral task
behavioral1
Sample
d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe
Resource
win10v2004-20221111-en
General
-
Target
d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe
-
Size
38KB
-
MD5
456629f5b57a130f364f47dea3592b80
-
SHA1
cb084b3416916d696ca443d4021e02bafd1aa23a
-
SHA256
d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f
-
SHA512
9376a233bf1467b42ca690f39bfa6fc1de244ecc86da96540aba89a35069c246c52582b314ff8af5f1ec811317c343294a20605a19bf93fc9bee631e244eb20a
-
SSDEEP
768:sSPJfXtyaslu0UZcvm1NrqzGWKGDbGlStXhB8jfT/U:XPJfXtyaku3Zc+fPWKWbG0RKjfT/U
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\K7Wg0aB.com d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe File opened for modification C:\Windows\Fonts\K7Wg0aB.com d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4004 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 4004 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83 PID 2692 wrote to memory of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83 PID 2692 wrote to memory of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83 PID 2692 wrote to memory of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83 PID 2692 wrote to memory of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83 PID 2692 wrote to memory of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83 PID 2692 wrote to memory of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83 PID 2692 wrote to memory of 4004 2692 d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe"C:\Users\Admin\AppData\Local\Temp\d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe"C:\Users\Admin\AppData\Local\Temp\d5a6114d6a2209823240a55a579d27cc409e02dad09296948175c779cc733e3f.exe"2⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2452