Analysis
-
max time kernel
143s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 12:16
Static task
static1
Behavioral task
behavioral1
Sample
d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe
Resource
win10v2004-20220812-en
General
-
Target
d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe
-
Size
24KB
-
MD5
6421eb613cb89b0b33fbf3daf32d92d5
-
SHA1
e9f53b41a915fb31098732b8d5192a8217b7e928
-
SHA256
d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530
-
SHA512
c32e0e9a620a0e3b080a186472b91da9d764ebff258ea9e454d3c2367785231959bd5d09f9e512768fe1430a6f529ac09e4beb024200bc04aef31dacdb4e9155
-
SSDEEP
384:f6t7RBCg2j76mHGzgKLYo9SCRAyv/iM9A8ZDkLkiMrMNlhv6RqCrBm9FzGQ:St7f2jTmcK3SCLTkPgMNl4RvrkFl
Malware Config
Signatures
-
Unexpected DNS network traffic destination 5 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 Destination IP 83.133.119.139 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\0E7j2JL.com d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe File opened for modification C:\Windows\Fonts\0E7j2JL.com d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4844 d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe 4844 d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe"C:\Users\Admin\AppData\Local\Temp\d8d1ab5a39df7e69d47f9b93cff53a4b186718e6d238e3e1568c2ed4de354530.exe"1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1664