Analysis

  • max time kernel
    167s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 11:54

General

  • Target

    f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll

  • Size

    35KB

  • MD5

    0493724e78412d0f414c7b8a699a7a90

  • SHA1

    796ab0b66a20e1f72bc23dc8ba6bc70854a950d5

  • SHA256

    f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c

  • SHA512

    67f73c2d07a41c67d35f7f057a04df09029c202e58be212c0e8422ffc6d7b205b8175c9f33438f2b76a45b673f61e52c336c83c673dc734c143423dead6f7ca8

  • SSDEEP

    768:BzVffeW/ija+1IiBdQrrubgeattSKJDrSxhvIih666E:BzBfadQvuHbKlr4h1f

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\f1365b27d96aee93d6ddb7d88e56cfedccfa064a0e23877207066b0239e9a49c.dll,#1
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Suspicious use of WriteProcessMemory
      PID:676
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe"
        3⤵
        • Executes dropped EXE
        PID:4328

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yuns32.exe

    Filesize

    34KB

    MD5

    8a879f76755c2d1f02eeb78d2887342f

    SHA1

    7a94565ad320e6e7a8773ba9e6febaef41836452

    SHA256

    f4533331667ec62d0b10cfc3e073bedaa28fc7e47de6fc2f18fa5d99aefdc8a1

    SHA512

    94f9ba65ef4c451be972b74a29b83d9a8292940280e9d4a6b5cbe0b256d97ff196cf95bdfd4c150780f8d45dc9189a9dafdc124d7911cfb4a45155963811c37c

  • memory/676-132-0x0000000000000000-mapping.dmp

  • memory/676-133-0x0000000000850000-0x0000000000862000-memory.dmp

    Filesize

    72KB

  • memory/4328-134-0x0000000000000000-mapping.dmp