Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2022, 01:45
Static task
static1
Behavioral task
behavioral1
Sample
40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe
Resource
win10v2004-20220812-en
General
-
Target
40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe
-
Size
1.7MB
-
MD5
4fbeec1a772be5f9ad1325d2601c7928
-
SHA1
2dec7958c62a24c05d8e1e259bb185d42dfddfbc
-
SHA256
40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826
-
SHA512
837663bb1a7db821fd504bf85629e6a453da77896e55f58e07b44d177bfddbf2b4a9965512c1a7d0660abf322618ded2fb208c67ada19b10d76b7b59a45321ea
-
SSDEEP
24576:4ry2uXzmVL5I6tVUi723/1YfyQAEEwxQypgMUFo8rbBdmFb2wGqL40aBXDVuWYYr:4unYZ723a/Qya1Fo8rzWb2ELi1D0Wm8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe -
Loads dropped DLL 3 IoCs
pid Process 3604 rundll32.exe 392 rundll32.exe 392 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings 40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3524 wrote to memory of 4788 3524 40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe 79 PID 3524 wrote to memory of 4788 3524 40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe 79 PID 3524 wrote to memory of 4788 3524 40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe 79 PID 4788 wrote to memory of 3604 4788 control.exe 81 PID 4788 wrote to memory of 3604 4788 control.exe 81 PID 4788 wrote to memory of 3604 4788 control.exe 81 PID 3604 wrote to memory of 4936 3604 rundll32.exe 82 PID 3604 wrote to memory of 4936 3604 rundll32.exe 82 PID 4936 wrote to memory of 392 4936 RunDll32.exe 83 PID 4936 wrote to memory of 392 4936 RunDll32.exe 83 PID 4936 wrote to memory of 392 4936 RunDll32.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe"C:\Users\Admin\AppData\Local\Temp\40b56c427f3b48710e30a25c3ce1637230fef81617f5cd03610b0b64264af826.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\CKRLZK.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\CKRLZK.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\CKRLZK.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\CKRLZK.CPL",5⤵
- Loads dropped DLL
PID:392
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD5ecb87edf1b562b07dd1ceafe9f8816d3
SHA1f1bf97f09cb13338e391b69078a56d8edede4a4b
SHA256ee6a8939f9c5e5f3a6d0e9c45fea31f1391c27d3ee66f1f45a775890ed9b9aed
SHA51206662c3bb2f9b2c5986e445c562c8b3bf1105112a576c858c895ba763a7d89a326aae412ac226e1b0acdedae1abedf741492d0811279440c1248ed88eb50034c
-
Filesize
2.7MB
MD5ecb87edf1b562b07dd1ceafe9f8816d3
SHA1f1bf97f09cb13338e391b69078a56d8edede4a4b
SHA256ee6a8939f9c5e5f3a6d0e9c45fea31f1391c27d3ee66f1f45a775890ed9b9aed
SHA51206662c3bb2f9b2c5986e445c562c8b3bf1105112a576c858c895ba763a7d89a326aae412ac226e1b0acdedae1abedf741492d0811279440c1248ed88eb50034c
-
Filesize
2.7MB
MD5ecb87edf1b562b07dd1ceafe9f8816d3
SHA1f1bf97f09cb13338e391b69078a56d8edede4a4b
SHA256ee6a8939f9c5e5f3a6d0e9c45fea31f1391c27d3ee66f1f45a775890ed9b9aed
SHA51206662c3bb2f9b2c5986e445c562c8b3bf1105112a576c858c895ba763a7d89a326aae412ac226e1b0acdedae1abedf741492d0811279440c1248ed88eb50034c
-
Filesize
2.7MB
MD5ecb87edf1b562b07dd1ceafe9f8816d3
SHA1f1bf97f09cb13338e391b69078a56d8edede4a4b
SHA256ee6a8939f9c5e5f3a6d0e9c45fea31f1391c27d3ee66f1f45a775890ed9b9aed
SHA51206662c3bb2f9b2c5986e445c562c8b3bf1105112a576c858c895ba763a7d89a326aae412ac226e1b0acdedae1abedf741492d0811279440c1248ed88eb50034c