Analysis
-
max time kernel
28s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe
Resource
win10v2004-20220812-en
General
-
Target
6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe
-
Size
139KB
-
MD5
af225de752e642dcf643c2e2d899495c
-
SHA1
867576cdbd4de3fc09b88a2c740f4bf950b4cd64
-
SHA256
6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b
-
SHA512
d7270acff852c95d648e351c6a9055540e4b702724ba136daa0bc6c2bf70f63db47366f1b847bfa637accc61c75862f8e07b7534c40b3f27f4c701274611ca3b
-
SSDEEP
3072:jQIURTXJeMlorcVTSDhJF4pUykZKiom5uoYtXPEDUhKrqa:js9lor2TSDhJF4p0Zhom5LOzh4qa
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 540 rundll32.exe 540 rundll32.exe 540 rundll32.exe 540 rundll32.exe 1888 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Microsoft Help\\Adobe\\swgkvdhhd.dll\",AVCConfigGetAPIExtW" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Microsoft Help\\Adobe\\swgkvdhhd.dll\",AVCConfigGetAPIExtW" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Microsoft Help\\Adobe\\swgkvdhhd.dll\",AVCConfigGetAPIExtW" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 936 rundll32.exe 540 rundll32.exe 540 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 540 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1888 wrote to memory of 936 1888 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 28 PID 1888 wrote to memory of 936 1888 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 28 PID 1888 wrote to memory of 936 1888 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 28 PID 1888 wrote to memory of 936 1888 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 28 PID 1888 wrote to memory of 936 1888 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 28 PID 1888 wrote to memory of 936 1888 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 28 PID 1888 wrote to memory of 936 1888 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 28 PID 936 wrote to memory of 540 936 rundll32.exe 29 PID 936 wrote to memory of 540 936 rundll32.exe 29 PID 936 wrote to memory of 540 936 rundll32.exe 29 PID 936 wrote to memory of 540 936 rundll32.exe 29 PID 936 wrote to memory of 540 936 rundll32.exe 29 PID 936 wrote to memory of 540 936 rundll32.exe 29 PID 936 wrote to memory of 540 936 rundll32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe"C:\Users\Admin\AppData\Local\Temp\6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\swgkvdhhd\swgkvdhhd.dll",AVCConfigGetAPIExt2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Microsoft Help\Adobe\swgkvdhhd.dll",AVCConfigGetAPIExtW3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:540
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544