Analysis

  • max time kernel
    241s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2022 11:54

General

  • Target

    f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll

  • Size

    35KB

  • MD5

    0493724e78412d0f414c7b8a699a7a90

  • SHA1

    796ab0b66a20e1f72bc23dc8ba6bc70854a950d5

  • SHA256

    f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c

  • SHA512

    67f73c2d07a41c67d35f7f057a04df09029c202e58be212c0e8422ffc6d7b205b8175c9f33438f2b76a45b673f61e52c336c83c673dc734c143423dead6f7ca8

  • SSDEEP

    768:BzVffeW/ija+1IiBdQrrubgeattSKJDrSxhvIih666E:BzBfadQvuHbKlr4h1f

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops startup file 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll,#1
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe"
        3⤵
        • Executes dropped EXE
        PID:1920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe

    Filesize

    18KB

    MD5

    ffa0046d645d0c9e4df1d7f627b18d3e

    SHA1

    fd9f8f9683cb4904285047b6c74c98976054dbf9

    SHA256

    bc3ac2645b738501ecfd5a60ffe5b8ad9266ec489fbb5da29ab0fe398ac760ff

    SHA512

    2d1d69292de8785f7028aa338f54fc7acb1c7576affb2cba6eeaeb8fb0dcc0756df5a4a06dfc005d044c9769673d39ecd8a4bbe6adfb2942094d98ad1325d872

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe

    Filesize

    18KB

    MD5

    ffa0046d645d0c9e4df1d7f627b18d3e

    SHA1

    fd9f8f9683cb4904285047b6c74c98976054dbf9

    SHA256

    bc3ac2645b738501ecfd5a60ffe5b8ad9266ec489fbb5da29ab0fe398ac760ff

    SHA512

    2d1d69292de8785f7028aa338f54fc7acb1c7576affb2cba6eeaeb8fb0dcc0756df5a4a06dfc005d044c9769673d39ecd8a4bbe6adfb2942094d98ad1325d872

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe

    Filesize

    18KB

    MD5

    ffa0046d645d0c9e4df1d7f627b18d3e

    SHA1

    fd9f8f9683cb4904285047b6c74c98976054dbf9

    SHA256

    bc3ac2645b738501ecfd5a60ffe5b8ad9266ec489fbb5da29ab0fe398ac760ff

    SHA512

    2d1d69292de8785f7028aa338f54fc7acb1c7576affb2cba6eeaeb8fb0dcc0756df5a4a06dfc005d044c9769673d39ecd8a4bbe6adfb2942094d98ad1325d872

  • memory/1516-54-0x0000000000000000-mapping.dmp

  • memory/1516-55-0x0000000075551000-0x0000000075553000-memory.dmp

    Filesize

    8KB

  • memory/1516-56-0x0000000000131000-0x0000000000138000-memory.dmp

    Filesize

    28KB

  • memory/1920-59-0x0000000000000000-mapping.dmp