Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe
Resource
win10v2004-20220901-en
General
-
Target
938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe
-
Size
1.8MB
-
MD5
815b2e145b5647be4aaf95ee2de52f7e
-
SHA1
9ea503286e5fb0b3d137f4368e5d5fa496c50431
-
SHA256
938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f
-
SHA512
edd6dd4633868d6003f2449fa3599140e7308e115aaf8fb74f052375ab8d6efeed28af50c6e167ee545495184c6850e3ca7334bc314a0e4cd99a46d0dd4f2483
-
SSDEEP
49152:4unOhqxUFQAuw9xDRCq0J/me1B8tXvGIJW9KIxPYO1rI:4KelFjXaemTIJUN4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe -
Loads dropped DLL 2 IoCs
pid Process 3392 rundll32.exe 448 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings 938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4512 wrote to memory of 5060 4512 938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe 80 PID 4512 wrote to memory of 5060 4512 938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe 80 PID 4512 wrote to memory of 5060 4512 938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe 80 PID 5060 wrote to memory of 3392 5060 control.exe 82 PID 5060 wrote to memory of 3392 5060 control.exe 82 PID 5060 wrote to memory of 3392 5060 control.exe 82 PID 3392 wrote to memory of 4768 3392 rundll32.exe 85 PID 3392 wrote to memory of 4768 3392 rundll32.exe 85 PID 4768 wrote to memory of 448 4768 RunDll32.exe 86 PID 4768 wrote to memory of 448 4768 RunDll32.exe 86 PID 4768 wrote to memory of 448 4768 RunDll32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe"C:\Users\Admin\AppData\Local\Temp\938d7427fceb7e021ca024f1c6b289209dbeacae66729a4b4b8a862eaa47561f.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\IvPH.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IvPH.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IvPH.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\IvPH.CpL",5⤵
- Loads dropped DLL
PID:448
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5b4ebef36191df15cce12ecf1a9678f12
SHA18a2770810392d59fcd835c6524ddbf3a37e09b3e
SHA256e12263ff44662de69de15c61753c616e80d9e59919be01a89396ae8e099a18f8
SHA51241dfa58c1026be97c741bf20ab1932cbc08a79dee26141c7e31f88a18a731378da5a5107a6418da2183be4b072c5620c232a2cd679eba7a008364a8aa34af691
-
Filesize
3.5MB
MD5b4ebef36191df15cce12ecf1a9678f12
SHA18a2770810392d59fcd835c6524ddbf3a37e09b3e
SHA256e12263ff44662de69de15c61753c616e80d9e59919be01a89396ae8e099a18f8
SHA51241dfa58c1026be97c741bf20ab1932cbc08a79dee26141c7e31f88a18a731378da5a5107a6418da2183be4b072c5620c232a2cd679eba7a008364a8aa34af691
-
Filesize
3.5MB
MD5b4ebef36191df15cce12ecf1a9678f12
SHA18a2770810392d59fcd835c6524ddbf3a37e09b3e
SHA256e12263ff44662de69de15c61753c616e80d9e59919be01a89396ae8e099a18f8
SHA51241dfa58c1026be97c741bf20ab1932cbc08a79dee26141c7e31f88a18a731378da5a5107a6418da2183be4b072c5620c232a2cd679eba7a008364a8aa34af691