Analysis
-
max time kernel
38s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 03:37
Static task
static1
Behavioral task
behavioral1
Sample
ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe
Resource
win10v2004-20220812-en
General
-
Target
ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe
-
Size
131KB
-
MD5
a589ddbf4719a880c9dca781f3a23cdb
-
SHA1
c048e7e17aa0304ba6a238470a83d574d45745fd
-
SHA256
ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400
-
SHA512
fbcda52d0c68017e5f2372643221904a7cb5c3324be91524c08711e412315967678581014caf6f93d922e99f80c82c0f9d23b51eadac515cd4ee71173167ad5a
-
SSDEEP
3072:IwjQUimS8Si3JoMSmpQvO2BTxfic3GsEI0fVR:ImQJT8bvRsOaTxKc3Idfv
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 1240 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe 908 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\odbcCommsdb = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\confobj90\\odbcCommsdb.dll\",usermaphid iTunesobjdrv" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1240 2000 ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe 28 PID 2000 wrote to memory of 1240 2000 ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe 28 PID 2000 wrote to memory of 1240 2000 ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe 28 PID 2000 wrote to memory of 1240 2000 ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe 28 PID 2000 wrote to memory of 1240 2000 ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe 28 PID 2000 wrote to memory of 1240 2000 ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe 28 PID 2000 wrote to memory of 1240 2000 ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe 28 PID 1240 wrote to memory of 908 1240 rundll32.exe 30 PID 1240 wrote to memory of 908 1240 rundll32.exe 30 PID 1240 wrote to memory of 908 1240 rundll32.exe 30 PID 1240 wrote to memory of 908 1240 rundll32.exe 30 PID 1240 wrote to memory of 908 1240 rundll32.exe 30 PID 1240 wrote to memory of 908 1240 rundll32.exe 30 PID 1240 wrote to memory of 908 1240 rundll32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe"C:\Users\Admin\AppData\Local\Temp\ceaa7f539a2e7dbfdcbf76514327a19988c47f35304c30caf639e7f04ff3e400.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\iTunesMobilemon.dll", usermaphid winEventClock2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\confobj90\odbcCommsdb.dll",usermaphid iTunesobjdrv3⤵
- Loads dropped DLL
PID:908
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719
-
Filesize
144KB
MD593bd0c9c5fcd06de180567e246aadfa1
SHA19b657c4e0009ec048edeee0513b215a41f079cb9
SHA256ff0d9b906708e8f5ba4ef3403983f691ed635208d26200e8b161a7a0c0267496
SHA51247fc13974bd759170e51124324baaebd88b6961a5198e04d8be046f41baa25b4e19b00802b3561849a59605e7755cd674c60ff984e51a63703369280f4bf9719