Analysis
-
max time kernel
175s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2022 17:57
Static task
static1
Behavioral task
behavioral1
Sample
c0f7a1deef7c6aa8d436d447d2ccd2df46b5d08a810e9e161040834ec592643d.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0f7a1deef7c6aa8d436d447d2ccd2df46b5d08a810e9e161040834ec592643d.dll
Resource
win10v2004-20220812-en
General
-
Target
c0f7a1deef7c6aa8d436d447d2ccd2df46b5d08a810e9e161040834ec592643d.dll
-
Size
610KB
-
MD5
c801ec84e76857a3c1461d52712259df
-
SHA1
750a58e62efc16c27becf4309720fdf9a0a2b7dc
-
SHA256
c0f7a1deef7c6aa8d436d447d2ccd2df46b5d08a810e9e161040834ec592643d
-
SHA512
5df18750800bec8b2db442903f1e06b517155e7ee649f9b35fc45cae7f3ace61e8c08ed16b28c22cec62f1c23951e84707976d6b7971c9154d5fe34f9c47f60f
-
SSDEEP
12288:y4G/5NwYkK19iOCr+TMoO30mYn0YaAsG5QgxM5DKTrH5SZs2o:y4GAK19iOCr+TMoO30mYn0YaAsNgxM50
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\.Net CLR\Parameters\ServiceDll = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c0f7a1deef7c6aa8d436d447d2ccd2df46b5d08a810e9e161040834ec592643d.dll" rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3400 rundll32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3400 3972 rundll32.exe 79 PID 3972 wrote to memory of 3400 3972 rundll32.exe 79 PID 3972 wrote to memory of 3400 3972 rundll32.exe 79 PID 4808 wrote to memory of 4468 4808 svchost.exe 81 PID 4808 wrote to memory of 4468 4808 svchost.exe 81 PID 4808 wrote to memory of 4468 4808 svchost.exe 81 PID 3400 wrote to memory of 3596 3400 rundll32.exe 82 PID 3400 wrote to memory of 3596 3400 rundll32.exe 82 PID 3400 wrote to memory of 3596 3400 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0f7a1deef7c6aa8d436d447d2ccd2df46b5d08a810e9e161040834ec592643d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0f7a1deef7c6aa8d436d447d2ccd2df46b5d08a810e9e161040834ec592643d.dll,#12⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\SysWOW64\rundll32.exe" > nul3⤵PID:3596
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k ".Net CLR"1⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe c:\users\admin\appdata\local\temp\c0f7a1deef7c6aa8d436d447d2ccd2df46b5d08a810e9e161040834ec592643d.dll, Launch2⤵PID:4468
-