Analysis

  • max time kernel
    152s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/12/2022, 15:39

General

  • Target

    969e0942fe481d83b6033ac346332dcb6102f7a3cff00aa486ba54e6c0744104.exe

  • Size

    437KB

  • MD5

    279f2ae3c6930cec584a4eac6f9c51d4

  • SHA1

    14e16616dc9a70fb0230f3fe9bf6756a7fe24975

  • SHA256

    969e0942fe481d83b6033ac346332dcb6102f7a3cff00aa486ba54e6c0744104

  • SHA512

    9f866e4c4817139da4cd1c50de6b2f958c5f36e4e0d7f5522f4786cd328bcd62255ee42bbb9deb211f30eb95255279025c9c49f74bd82f5298213544382d5e07

  • SSDEEP

    12288:bcVsySEg05Kc9lZ6Hk3xvxUGHhF+ZPPfnEUnRmbsNg:bcVNSEgpc9LvBQlvVmoNg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 64 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\969e0942fe481d83b6033ac346332dcb6102f7a3cff00aa486ba54e6c0744104.exe
    "C:\Users\Admin\AppData\Local\Temp\969e0942fe481d83b6033ac346332dcb6102f7a3cff00aa486ba54e6c0744104.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Roaming\RollingPop\RollingPop_R.exe
      "C:\Users\Admin\AppData\Roaming\RollingPop\RollingPop_R.exe" install|ROLL11
      2⤵
      • Executes dropped EXE
      PID:388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsqD39D.tmp\IpConfig.dll

    Filesize

    114KB

    MD5

    a3ed6f7ea493b9644125d494fbf9a1e6

    SHA1

    ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8

    SHA256

    ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08

    SHA512

    7099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1

  • C:\Users\Admin\AppData\Local\Temp\nsqD39D.tmp\inetc.dll

    Filesize

    20KB

    MD5

    c498ae64b4971132bba676873978de1e

    SHA1

    92e4009cd776b6c8616d8bffade7668ef3cb3c27

    SHA256

    5552bdde7e4113393f683ef501e4cc84dccc071bdc51391ea7fa3e7c1d49e4e8

    SHA512

    8e5ca35493f749a39ceae6796d2658ba10f7d8d9ceca45bb4365b338fabd1dfa9b9f92e33f50c91b0273e66adfbce4b98b09c15fd2473f8b214ed797462333d7

  • C:\Users\Admin\AppData\Local\Temp\nsqD39D.tmp\inetc.dll

    Filesize

    20KB

    MD5

    c498ae64b4971132bba676873978de1e

    SHA1

    92e4009cd776b6c8616d8bffade7668ef3cb3c27

    SHA256

    5552bdde7e4113393f683ef501e4cc84dccc071bdc51391ea7fa3e7c1d49e4e8

    SHA512

    8e5ca35493f749a39ceae6796d2658ba10f7d8d9ceca45bb4365b338fabd1dfa9b9f92e33f50c91b0273e66adfbce4b98b09c15fd2473f8b214ed797462333d7

  • C:\Users\Admin\AppData\Local\Temp\nsqD39D.tmp\ip.dll

    Filesize

    16KB

    MD5

    4df6320e8281512932a6e86c98de2c17

    SHA1

    ae6336192d27874f9cd16cd581f1c091850cf494

    SHA256

    7744a495ceacf8584d4f6786699e94a09935a94929d4861142726562af53faa4

    SHA512

    7c468de59614f506a2ce8445ef00267625e5a8e483913cdd18636cea543be0ca241891e75979a55bb67eecc11a7ac0649b48b55a10e9a01362a0250839462d3b

  • C:\Users\Admin\AppData\Local\Temp\nsqD39D.tmp\ip.dll

    Filesize

    16KB

    MD5

    4df6320e8281512932a6e86c98de2c17

    SHA1

    ae6336192d27874f9cd16cd581f1c091850cf494

    SHA256

    7744a495ceacf8584d4f6786699e94a09935a94929d4861142726562af53faa4

    SHA512

    7c468de59614f506a2ce8445ef00267625e5a8e483913cdd18636cea543be0ca241891e75979a55bb67eecc11a7ac0649b48b55a10e9a01362a0250839462d3b

  • C:\Users\Admin\AppData\Roaming\RollingPop\RollingPop_R.exe

    Filesize

    32KB

    MD5

    3abb7006ce9ac527d08544506f53de35

    SHA1

    edc77b4c7dae976e018f54aac3ca249549d84c04

    SHA256

    698e6050d506f1694958bf2b78ce79753f09d563a1798160741edcefdf065e6c

    SHA512

    35481eb989b3127f67d1c33130e3c12900202d0f5f38f8f2d4218a8d08a5181d5a29b7449f4750793541288d32663aa453c0dd64e1c246894bcedcac5c128ffa

  • C:\Users\Admin\AppData\Roaming\RollingPop\RollingPop_R.exe

    Filesize

    32KB

    MD5

    3abb7006ce9ac527d08544506f53de35

    SHA1

    edc77b4c7dae976e018f54aac3ca249549d84c04

    SHA256

    698e6050d506f1694958bf2b78ce79753f09d563a1798160741edcefdf065e6c

    SHA512

    35481eb989b3127f67d1c33130e3c12900202d0f5f38f8f2d4218a8d08a5181d5a29b7449f4750793541288d32663aa453c0dd64e1c246894bcedcac5c128ffa

  • C:\Windows\SysWOW64\Base64.dll

    Filesize

    32KB

    MD5

    888ff6462ada7c38a46e70dfdf2852d6

    SHA1

    983964dd336e29209a9d445171c06e47b73db9f9

    SHA256

    bdbb123032026d872f6a0b9aab394f65b5306f5dd77414620321abdd9e3dc36a

    SHA512

    096c5c2abb558489075461df0b4224a0ea5f0a89b5f1df607ec67e65639bd4af65815e555fe1bbee8c21d481adab948702eaec39a187235de4aca167e4253920

  • C:\Windows\SysWOW64\MSINET.OCX

    Filesize

    112KB

    MD5

    7bec181a21753498b6bd001c42a42722

    SHA1

    3249f233657dc66632c0539c47895bfcee5770cc

    SHA256

    73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

    SHA512

    d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

  • C:\Windows\SysWOW64\VB6KO.DLL

    Filesize

    99KB

    MD5

    dccf769747dbdd5187877ae82934e346

    SHA1

    d5f4a8e686c441a5bca4d20f31297cadd017301a

    SHA256

    c88069e00ebfde2ce18efd3832a948d0dc642b57db194d412511257d5b49193c

    SHA512

    b0e3393db8836ea018c891c2c399dbf3116a6972fca521e136aaad712003b0a1534621d62b681b43e4833bbb3497e38ab4c613c227976e0699b8e98353ff46cb

  • memory/1460-137-0x0000000002361000-0x0000000002364000-memory.dmp

    Filesize

    12KB

  • memory/1460-141-0x0000000002981000-0x0000000002984000-memory.dmp

    Filesize

    12KB