Analysis
-
max time kernel
56s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
21/12/2022, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5.exe
Resource
win10-20220812-en
General
-
Target
e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5.exe
-
Size
1.8MB
-
MD5
8cf133d6df3d629a0035129dede4f2f9
-
SHA1
3e15c8636a7ab72f3115125005611f592d6f49a7
-
SHA256
e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5
-
SHA512
bef0888766f9570f05b063bcd14c201a6ca26649bdd4f608dd3264b4699b7898576fe694a7aae59c2881991c2a2059bcd9f64ba29204ed6d526bae723dabb865
-
SSDEEP
49152:A6Panh2qmsLBn2kzRNq3C463oPiEXqq180lKSqWTQ:fawqkmqyMXDPllqKQ
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1500 rundll32.exe 4828 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3796 2676 e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5.exe 66 PID 2676 wrote to memory of 3796 2676 e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5.exe 66 PID 2676 wrote to memory of 3796 2676 e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5.exe 66 PID 3796 wrote to memory of 1500 3796 control.exe 68 PID 3796 wrote to memory of 1500 3796 control.exe 68 PID 3796 wrote to memory of 1500 3796 control.exe 68 PID 1500 wrote to memory of 4548 1500 rundll32.exe 69 PID 1500 wrote to memory of 4548 1500 rundll32.exe 69 PID 4548 wrote to memory of 4828 4548 RunDll32.exe 70 PID 4548 wrote to memory of 4828 4548 RunDll32.exe 70 PID 4548 wrote to memory of 4828 4548 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5.exe"C:\Users\Admin\AppData\Local\Temp\e460a17a222fe276e312b93913755790bd2e1b1831bfa06fa03dcede01da86f5.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\jOoK.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\jOoK.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\jOoK.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\jOoK.cpl",5⤵
- Loads dropped DLL
PID:4828
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD57bac5631012c3dc75e1535b2a838b5d2
SHA1222f70fca793d27183a49c49d8c22526902fce2b
SHA256c2b6951558cce05f7f359d347897cbb38aa870bd0d7cc849705235090fad60a7
SHA512a5a6b29fd28f733a973db0338819cc3c0ac6d5c521c300ced095929e2ad0927a5062f95da3b599666928915124da1999014dd50fcd108dbca2e08b2105ef87d3
-
Filesize
2.0MB
MD57bac5631012c3dc75e1535b2a838b5d2
SHA1222f70fca793d27183a49c49d8c22526902fce2b
SHA256c2b6951558cce05f7f359d347897cbb38aa870bd0d7cc849705235090fad60a7
SHA512a5a6b29fd28f733a973db0338819cc3c0ac6d5c521c300ced095929e2ad0927a5062f95da3b599666928915124da1999014dd50fcd108dbca2e08b2105ef87d3
-
Filesize
2.0MB
MD57bac5631012c3dc75e1535b2a838b5d2
SHA1222f70fca793d27183a49c49d8c22526902fce2b
SHA256c2b6951558cce05f7f359d347897cbb38aa870bd0d7cc849705235090fad60a7
SHA512a5a6b29fd28f733a973db0338819cc3c0ac6d5c521c300ced095929e2ad0927a5062f95da3b599666928915124da1999014dd50fcd108dbca2e08b2105ef87d3