Analysis

  • max time kernel
    288s
  • max time network
    326s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 16:12

General

  • Target

    f0db1d24ff4c6b7a5bf5403728dc7e221c44620af99326075a090d7daaf0056e.exe

  • Size

    168KB

  • MD5

    84bde147952c733a576987980796f580

  • SHA1

    b56dad6e162ea2bf28181a0178597922e417dc40

  • SHA256

    f0db1d24ff4c6b7a5bf5403728dc7e221c44620af99326075a090d7daaf0056e

  • SHA512

    274c21d858679adca8a3f791d2b16cabf7f7a9af5ae601ebf77bbc081aad89bb8bb1f618fd53f7e8e74bdb1acaaf6706c3cf8bfa91481d33e22e87ce28ada023

  • SSDEEP

    3072:TQIURTXJXdMn35l27PZA4Qi1a8njb8aDryvx1tNt+UNNOXXT/8NFfNAP:Tsc3iZZaEn8Er8f0yOHT/0lAP

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0db1d24ff4c6b7a5bf5403728dc7e221c44620af99326075a090d7daaf0056e.exe
    "C:\Users\Admin\AppData\Local\Temp\f0db1d24ff4c6b7a5bf5403728dc7e221c44620af99326075a090d7daaf0056e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe /s "C:\Users\Admin\AppData\Local\Temp\nst13D6.tmp\hvlduxmp.dll"
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      PID:3484

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsjEF07.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nsjEF07.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f

  • C:\Users\Admin\AppData\Local\Temp\nst13D6.tmp\hvlduxmp.dll

    Filesize

    724KB

    MD5

    c8ba018ed4a06c28657146326151c5d8

    SHA1

    65670a104b327629622355be14b1d78de3e2f81f

    SHA256

    ce8e58a59ab8d325618cfd4b144bb327a35e11674b069f76fc43b3696c3a25b5

    SHA512

    2ecf565ed5db63b84197cfebc80adcee84b6c9ccd201c900a9947cafde34ec1bb64a1b166d31363a70f4dc0e52ee3e80e70d64e0ed3d036a8acd39f0a5f4f24e

  • C:\Users\Admin\AppData\Local\Temp\nst13D6.tmp\hvlduxmp.dll

    Filesize

    724KB

    MD5

    c8ba018ed4a06c28657146326151c5d8

    SHA1

    65670a104b327629622355be14b1d78de3e2f81f

    SHA256

    ce8e58a59ab8d325618cfd4b144bb327a35e11674b069f76fc43b3696c3a25b5

    SHA512

    2ecf565ed5db63b84197cfebc80adcee84b6c9ccd201c900a9947cafde34ec1bb64a1b166d31363a70f4dc0e52ee3e80e70d64e0ed3d036a8acd39f0a5f4f24e

  • memory/3484-137-0x00000000757F0000-0x00000000758A7000-memory.dmp

    Filesize

    732KB