Analysis
-
max time kernel
116s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll
Resource
win10v2004-20220812-en
General
-
Target
20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll
-
Size
96KB
-
MD5
fc7aa0c1358943f14607b788b2ea7540
-
SHA1
444ff4c70318d2ed8a5c6a83dd550cf13eac0653
-
SHA256
20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338
-
SHA512
caf5780636ea62fbbb76fa19429bab488b61590f130fe6607082bdf05a3c569819ccd2c05720208d54f4d5a974fe5b9d767a81a432f3f52ab52a1ac551969d9a
-
SSDEEP
768:EnKl2XOz3sCu+/h29vOYXOhYFtDJOgpg5Rd5WtXhG2yg0rvLp8N:EnKl2oOOYXTFtTCh5Yk2y3jp8N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 320 instsp2.exe -
resource yara_rule behavioral1/files/0x000a00000001273e-57.dat upx behavioral1/memory/320-61-0x00000000003E0000-0x000000000040C000-memory.dmp upx behavioral1/files/0x000a00000001273e-64.dat upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\instsp2.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1272 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 320 instsp2.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1272 1984 rundll32.exe 28 PID 1984 wrote to memory of 1272 1984 rundll32.exe 28 PID 1984 wrote to memory of 1272 1984 rundll32.exe 28 PID 1984 wrote to memory of 1272 1984 rundll32.exe 28 PID 1984 wrote to memory of 1272 1984 rundll32.exe 28 PID 1984 wrote to memory of 1272 1984 rundll32.exe 28 PID 1984 wrote to memory of 1272 1984 rundll32.exe 28 PID 1272 wrote to memory of 320 1272 rundll32.exe 29 PID 1272 wrote to memory of 320 1272 rundll32.exe 29 PID 1272 wrote to memory of 320 1272 rundll32.exe 29 PID 1272 wrote to memory of 320 1272 rundll32.exe 29 PID 320 wrote to memory of 1704 320 instsp2.exe 37 PID 320 wrote to memory of 1704 320 instsp2.exe 37 PID 320 wrote to memory of 1704 320 instsp2.exe 37 PID 320 wrote to memory of 1704 320 instsp2.exe 37
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20bbe829dc628e106797958b422d4ebacd29066b6fd5418930a7e42a57546338.dll,#12⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\instsp2.exeC:\Windows\instsp2.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\instsp2.exe > nul4⤵PID:1704
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5c0a73a33bc9b336e8fa0ea0c9f501b38
SHA1d7dbcd51bd10039303bc993bd582a4bbd29f8904
SHA256fcea9a342f04acae421a4bc59037a8e73b19cc91614ebb08613dfac2f3bc7f14
SHA5126a313be1141f377f15d6765f88f4650fa721982c07f169124a0633fe1c94d4b72e5b66adc9b62d7037f13d8bb54801606f89ae052a6d1e7b6bd6b2674304e859
-
Filesize
9KB
MD5c0a73a33bc9b336e8fa0ea0c9f501b38
SHA1d7dbcd51bd10039303bc993bd582a4bbd29f8904
SHA256fcea9a342f04acae421a4bc59037a8e73b19cc91614ebb08613dfac2f3bc7f14
SHA5126a313be1141f377f15d6765f88f4650fa721982c07f169124a0633fe1c94d4b72e5b66adc9b62d7037f13d8bb54801606f89ae052a6d1e7b6bd6b2674304e859