Analysis
-
max time kernel
50s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c.dll
Resource
win10v2004-20221111-en
General
-
Target
468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c.dll
-
Size
121KB
-
MD5
ad073afc9cc3a0e55f379fe218839880
-
SHA1
85bdb48cd44c14123fbb94021ca96743ac5c445a
-
SHA256
468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c
-
SHA512
324169f5c1d7aa5af414a92380691a50e1fbf4913636af657b24147ad1d5aa41bc52e1fc016d82217080e3b42935689d9fc921b0a1b90c4865d296f5866edf4a
-
SSDEEP
1536:4ZfFsj+G40DEpf+eO7R+Uo1Fw3JU3KUdQtowqTqnItiXDKPH7j9jD4yCtJ2a3l:4Z9sjk0o6d+Uo/gJImQTrKKPbNsyMJ2
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe 1628 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\{1DC278FD-D5BF-4C2D-859E-F47B57C5BD14} = "rundll32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\{1DC278FD-D5BF-4C2D-859E-F47B57C5BD14}\\2c28.dll\",DllGetClassObject secret 18215" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1480 rundll32.exe 1628 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1480 1284 rundll32.exe 28 PID 1284 wrote to memory of 1480 1284 rundll32.exe 28 PID 1284 wrote to memory of 1480 1284 rundll32.exe 28 PID 1284 wrote to memory of 1480 1284 rundll32.exe 28 PID 1284 wrote to memory of 1480 1284 rundll32.exe 28 PID 1284 wrote to memory of 1480 1284 rundll32.exe 28 PID 1284 wrote to memory of 1480 1284 rundll32.exe 28 PID 1480 wrote to memory of 1628 1480 rundll32.exe 29 PID 1480 wrote to memory of 1628 1480 rundll32.exe 29 PID 1480 wrote to memory of 1628 1480 rundll32.exe 29 PID 1480 wrote to memory of 1628 1480 rundll32.exe 29 PID 1480 wrote to memory of 1628 1480 rundll32.exe 29 PID 1480 wrote to memory of 1628 1480 rundll32.exe 29 PID 1480 wrote to memory of 1628 1480 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c.dll,#12⤵
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\{1DC278FD-D5BF-4C2D-859E-F47B57C5BD14}\2c28.dll",DllGetClassObject secret 182153⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5ad073afc9cc3a0e55f379fe218839880
SHA185bdb48cd44c14123fbb94021ca96743ac5c445a
SHA256468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c
SHA512324169f5c1d7aa5af414a92380691a50e1fbf4913636af657b24147ad1d5aa41bc52e1fc016d82217080e3b42935689d9fc921b0a1b90c4865d296f5866edf4a
-
Filesize
121KB
MD5ad073afc9cc3a0e55f379fe218839880
SHA185bdb48cd44c14123fbb94021ca96743ac5c445a
SHA256468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c
SHA512324169f5c1d7aa5af414a92380691a50e1fbf4913636af657b24147ad1d5aa41bc52e1fc016d82217080e3b42935689d9fc921b0a1b90c4865d296f5866edf4a
-
Filesize
121KB
MD5ad073afc9cc3a0e55f379fe218839880
SHA185bdb48cd44c14123fbb94021ca96743ac5c445a
SHA256468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c
SHA512324169f5c1d7aa5af414a92380691a50e1fbf4913636af657b24147ad1d5aa41bc52e1fc016d82217080e3b42935689d9fc921b0a1b90c4865d296f5866edf4a
-
Filesize
121KB
MD5ad073afc9cc3a0e55f379fe218839880
SHA185bdb48cd44c14123fbb94021ca96743ac5c445a
SHA256468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c
SHA512324169f5c1d7aa5af414a92380691a50e1fbf4913636af657b24147ad1d5aa41bc52e1fc016d82217080e3b42935689d9fc921b0a1b90c4865d296f5866edf4a
-
Filesize
121KB
MD5ad073afc9cc3a0e55f379fe218839880
SHA185bdb48cd44c14123fbb94021ca96743ac5c445a
SHA256468b75480eaf2b1b96382a239142bf617f0b65f2ba3faf26527a1842457d246c
SHA512324169f5c1d7aa5af414a92380691a50e1fbf4913636af657b24147ad1d5aa41bc52e1fc016d82217080e3b42935689d9fc921b0a1b90c4865d296f5866edf4a