Analysis
-
max time kernel
167s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 11:54
Static task
static1
Behavioral task
behavioral1
Sample
f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll
Resource
win10v2004-20221111-en
General
-
Target
f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll
-
Size
35KB
-
MD5
0493724e78412d0f414c7b8a699a7a90
-
SHA1
796ab0b66a20e1f72bc23dc8ba6bc70854a950d5
-
SHA256
f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c
-
SHA512
67f73c2d07a41c67d35f7f057a04df09029c202e58be212c0e8422ffc6d7b205b8175c9f33438f2b76a45b673f61e52c336c83c673dc734c143423dead6f7ca8
-
SSDEEP
768:BzVffeW/ija+1IiBdQrrubgeattSKJDrSxhvIih666E:BzBfadQvuHbKlr4h1f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4328 yuns32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation rundll32.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe rundll32.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\RCX148.tmp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1320 wrote to memory of 676 1320 rundll32.exe 82 PID 1320 wrote to memory of 676 1320 rundll32.exe 82 PID 1320 wrote to memory of 676 1320 rundll32.exe 82 PID 676 wrote to memory of 4328 676 rundll32.exe 83 PID 676 wrote to memory of 4328 676 rundll32.exe 83 PID 676 wrote to memory of 4328 676 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll,#12⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe"3⤵
- Executes dropped EXE
PID:4328
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD58a879f76755c2d1f02eeb78d2887342f
SHA17a94565ad320e6e7a8773ba9e6febaef41836452
SHA256f4533331667ec62d0b10cfc3e073bedaa28fc7e47de6fc2f18fa5d99aefdc8a1
SHA51294f9ba65ef4c451be972b74a29b83d9a8292940280e9d4a6b5cbe0b256d97ff196cf95bdfd4c150780f8d45dc9189a9dafdc124d7911cfb4a45155963811c37c