Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-12-2022 14:20
Behavioral task
behavioral1
Sample
baf04deceb528bfb0e9026ea59cc0e990d6fb801a543de52ae06adec8c25461d.dll
Resource
win7-20220812-en
General
-
Target
baf04deceb528bfb0e9026ea59cc0e990d6fb801a543de52ae06adec8c25461d.dll
-
Size
6.0MB
-
MD5
89a5990fa68c0a5e6e37abfefa644a9e
-
SHA1
4117d473ae5cd47d6645ede338232ab7f1bd8cd1
-
SHA256
baf04deceb528bfb0e9026ea59cc0e990d6fb801a543de52ae06adec8c25461d
-
SHA512
e29d90b7e7f14b06c2378bc1547c8b26f6d9c009ddd4139527ff22fa3f3de11bc8388f0c6e1ca90f0f904d78b408acc03248a7ced4517681480ff480c9544966
-
SSDEEP
98304:6gneR9kp4C6i07BHQvWaUbNWQ4QlotB99GBRngd42LEeVSP4+V:6xq4C69pQxG7nOfl+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1500 992 WerFault.exe rundll32.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Signature rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Signature rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform ID rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 240 wrote to memory of 992 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 992 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 992 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 992 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 992 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 992 240 rundll32.exe rundll32.exe PID 240 wrote to memory of 992 240 rundll32.exe rundll32.exe PID 992 wrote to memory of 1500 992 rundll32.exe WerFault.exe PID 992 wrote to memory of 1500 992 rundll32.exe WerFault.exe PID 992 wrote to memory of 1500 992 rundll32.exe WerFault.exe PID 992 wrote to memory of 1500 992 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\baf04deceb528bfb0e9026ea59cc0e990d6fb801a543de52ae06adec8c25461d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\baf04deceb528bfb0e9026ea59cc0e990d6fb801a543de52ae06adec8c25461d.dll,#12⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 5203⤵
- Program crash
PID:1500
-
-