Analysis
-
max time kernel
89s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
05-12-2022 06:50
Static task
static1
Behavioral task
behavioral1
Sample
20d27b102df055856acf8ae1ce4e28216e8ad6d0bd3f260806105d0c2f0f69c2.exe
Resource
win10-20220812-en
General
-
Target
20d27b102df055856acf8ae1ce4e28216e8ad6d0bd3f260806105d0c2f0f69c2.exe
-
Size
1.8MB
-
MD5
8282d5b5180e25e10c81b031b7e0e27f
-
SHA1
541f2295d4d57638ac328d26861fe2b17f460e31
-
SHA256
20d27b102df055856acf8ae1ce4e28216e8ad6d0bd3f260806105d0c2f0f69c2
-
SHA512
1d738c87821b0c1775d4b638d1842d17a1316fd3a2e3c54b29a04aa1f626ceee4a51e64c2dd7cb494878bab9203699f79d021931e656f125ca16f51c8305964c
-
SSDEEP
49152:zun17E90xZR04WbOZWZL9ubdWZXqZGw2U:zKJE9a04MOZWpjd5E
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4036 rundll32.exe 4036 rundll32.exe 3864 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2512 wrote to memory of 3540 2512 20d27b102df055856acf8ae1ce4e28216e8ad6d0bd3f260806105d0c2f0f69c2.exe 66 PID 2512 wrote to memory of 3540 2512 20d27b102df055856acf8ae1ce4e28216e8ad6d0bd3f260806105d0c2f0f69c2.exe 66 PID 2512 wrote to memory of 3540 2512 20d27b102df055856acf8ae1ce4e28216e8ad6d0bd3f260806105d0c2f0f69c2.exe 66 PID 3540 wrote to memory of 4036 3540 control.exe 67 PID 3540 wrote to memory of 4036 3540 control.exe 67 PID 3540 wrote to memory of 4036 3540 control.exe 67 PID 4036 wrote to memory of 3352 4036 rundll32.exe 68 PID 4036 wrote to memory of 3352 4036 rundll32.exe 68 PID 3352 wrote to memory of 3864 3352 RunDll32.exe 69 PID 3352 wrote to memory of 3864 3352 RunDll32.exe 69 PID 3352 wrote to memory of 3864 3352 RunDll32.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\20d27b102df055856acf8ae1ce4e28216e8ad6d0bd3f260806105d0c2f0f69c2.exe"C:\Users\Admin\AppData\Local\Temp\20d27b102df055856acf8ae1ce4e28216e8ad6d0bd3f260806105d0c2f0f69c2.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\O~dZ.jkQ2⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\O~dZ.jkQ3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\O~dZ.jkQ4⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\O~dZ.jkQ5⤵
- Loads dropped DLL
PID:3864
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD53cb96732ba02f33b02e5e4c66e36a9d4
SHA141d363d7daa0b53bcf60d576b7da96164cd168ff
SHA256caedf9fc94f09e96b2272d05a4c978eb20884d7ca69192c53444aefc09ae7b72
SHA51259a201238ba87b9db518b6dccf5a032eda62e5b99892a927b9fc7fad014c62e31165febe7588dce301668f1e7b6bfa6ddb1409962fb59432ff5459d2940bb5f5
-
Filesize
3.5MB
MD53cb96732ba02f33b02e5e4c66e36a9d4
SHA141d363d7daa0b53bcf60d576b7da96164cd168ff
SHA256caedf9fc94f09e96b2272d05a4c978eb20884d7ca69192c53444aefc09ae7b72
SHA51259a201238ba87b9db518b6dccf5a032eda62e5b99892a927b9fc7fad014c62e31165febe7588dce301668f1e7b6bfa6ddb1409962fb59432ff5459d2940bb5f5
-
Filesize
3.5MB
MD53cb96732ba02f33b02e5e4c66e36a9d4
SHA141d363d7daa0b53bcf60d576b7da96164cd168ff
SHA256caedf9fc94f09e96b2272d05a4c978eb20884d7ca69192c53444aefc09ae7b72
SHA51259a201238ba87b9db518b6dccf5a032eda62e5b99892a927b9fc7fad014c62e31165febe7588dce301668f1e7b6bfa6ddb1409962fb59432ff5459d2940bb5f5
-
Filesize
3.5MB
MD53cb96732ba02f33b02e5e4c66e36a9d4
SHA141d363d7daa0b53bcf60d576b7da96164cd168ff
SHA256caedf9fc94f09e96b2272d05a4c978eb20884d7ca69192c53444aefc09ae7b72
SHA51259a201238ba87b9db518b6dccf5a032eda62e5b99892a927b9fc7fad014c62e31165febe7588dce301668f1e7b6bfa6ddb1409962fb59432ff5459d2940bb5f5