Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 21:21
Static task
static1
Behavioral task
behavioral1
Sample
8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d.dll
Resource
win10v2004-20220812-en
General
-
Target
8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d.dll
-
Size
23KB
-
MD5
439f88bea8f29148cd4caf720f531840
-
SHA1
5d5232bd07c58810eea4965eb04ed47e34b093da
-
SHA256
8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d
-
SHA512
af9e90c706737cbc317a3f8a6c3222de9a602f32c0e655e560f99066cb801fe5070b9920073762453710e35afb4254db9c756c6211534858fba4ff33a3ed5d92
-
SSDEEP
384:KA/aKe1URKrnt38RW5EUnLGp1hPYXBGaBTi9xIzDVJ5zG:C1URUXuULeaw2fVJ4
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChkDisk.lnk rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ChkDisk.dll rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\autochk = "rundll32.exe C:\\Windows\\system32\\autochk.dll,_IWMPEvents@16" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\autochk = "rundll32.exe C:\\Users\\Admin\\protect.dll,_IWMPEvents@16" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\autochk.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3428 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3428 3052 rundll32.exe 78 PID 3052 wrote to memory of 3428 3052 rundll32.exe 78 PID 3052 wrote to memory of 3428 3052 rundll32.exe 78
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e09d37569170e2798d05120f1cc61d45548bcb6a388fa467c46ea2fa437d02d.dll,#12⤵
- Drops startup file
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3428
-