Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 13:35
Static task
static1
Behavioral task
behavioral1
Sample
7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll
Resource
win10v2004-20220901-en
General
-
Target
7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll
-
Size
128KB
-
MD5
a5b4091f4a0eec54ee9a1e4113e7d6b0
-
SHA1
c255b0c8fead9141874f9b9af9cbfc0922dc83c4
-
SHA256
7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3
-
SHA512
b4673838b694e53a3026af45200fc3e524e6c636f7a14d2001165d0d17e62bcbe3804ea333cabcf5db254353542c21751c10485d31d690a22f688da3c723449a
-
SSDEEP
1536:mq1Jn6+QfGmUjwJTlvRqJ52l1AiIcuOkCF/TIETdPoucKjEOn0ADRKSvR1:N3EGT83MLA1iDbYTfhoucEx0AVR
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1724 4752 rundll32.exe 82 PID 4752 wrote to memory of 1724 4752 rundll32.exe 82 PID 4752 wrote to memory of 1724 4752 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7517564a67c1bc530ccee44e4c651a52be42c1f02c9475becbcbc44d1afe73c3.dll,#12⤵PID:1724
-