Analysis
-
max time kernel
91s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe
Resource
win10v2004-20220812-en
General
-
Target
6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe
-
Size
139KB
-
MD5
af225de752e642dcf643c2e2d899495c
-
SHA1
867576cdbd4de3fc09b88a2c740f4bf950b4cd64
-
SHA256
6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b
-
SHA512
d7270acff852c95d648e351c6a9055540e4b702724ba136daa0bc6c2bf70f63db47366f1b847bfa637accc61c75862f8e07b7534c40b3f27f4c701274611ca3b
-
SSDEEP
3072:jQIURTXJeMlorcVTSDhJF4pUykZKiom5uoYtXPEDUhKrqa:js9lor2TSDhJF4p0Zhom5LOzh4qa
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 4416 rundll32.exe 3620 rundll32.exe 1556 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 336 WerFault.exe 3928 WerFault.exe 3928 WerFault.exe 3928 WerFault.exe 336 WerFault.exe 336 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Comms\\Adobe\\swgkvdhhd.dll\",AVCConfigGetAPIExtW" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 336 1556 WerFault.exe 79 3928 336 WerFault.exe 84 -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Comms\\Adobe\\swgkvdhhd.dll\",AVCConfigGetAPIExtW" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Comms\\Adobe\\swgkvdhhd.dll\",AVCConfigGetAPIExtW" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4416 rundll32.exe 4416 rundll32.exe 4416 rundll32.exe 4416 rundll32.exe 4416 rundll32.exe 4416 rundll32.exe 4416 rundll32.exe 4416 rundll32.exe 3620 rundll32.exe 3620 rundll32.exe 3620 rundll32.exe 3620 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3620 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1556 wrote to memory of 4416 1556 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 80 PID 1556 wrote to memory of 4416 1556 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 80 PID 1556 wrote to memory of 4416 1556 6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe 80 PID 4416 wrote to memory of 3620 4416 rundll32.exe 81 PID 4416 wrote to memory of 3620 4416 rundll32.exe 81 PID 4416 wrote to memory of 3620 4416 rundll32.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe"C:\Users\Admin\AppData\Local\Temp\6a3c18c26e0c7d2bf5a96573d11054a20d6ace45626263e5b4996617decbef4b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\swgkvdhhd\swgkvdhhd.dll",AVCConfigGetAPIExt2⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Comms\Adobe\swgkvdhhd.dll",AVCConfigGetAPIExtW3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 8522⤵
- Loads dropped DLL
- Program crash
PID:336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 4963⤵
- Loads dropped DLL
- Program crash
PID:3928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1556 -ip 15561⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 336 -ip 3361⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3928 -ip 39281⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3928 -ip 39281⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3928 -ip 39281⤵PID:3040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 336 -ip 3361⤵PID:4556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 336 -ip 3361⤵PID:4696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544
-
Filesize
320KB
MD5900f93dd98873a312632acd711e261c3
SHA1ac6db0699bf09ea73a3903a2e9f1a63126fb7272
SHA256650e03c1631aee09c5303d1fb7601664a839ec74aae1fbdd4ac159f4aa2eca1f
SHA512796a9332406d6bc537ac0a74f95f4d88a1dc50472e18506d4bdd32df294dabac834d14a43b2453fc90a49afb7bb9c048ae42646ef3d4c275d86bf65e4cfe4544