Analysis
-
max time kernel
74s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/12/2022, 22:17
Static task
static1
Behavioral task
behavioral1
Sample
235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe
Resource
win10-20220901-en
General
-
Target
235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe
-
Size
2.0MB
-
MD5
5aeaaec0e5fe7667b3f0879051440bf4
-
SHA1
c87a6afbaa9bac0340812eeb3fa1221a26dfdad0
-
SHA256
235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da
-
SHA512
9a883b151bb9c3b523e7f4b4f1f63e935eeb47eb440da39588a7bc2c046b1603f9fa19cf9f58dafa4061c9a354178c898b446614d99f271956cc08184f2d1f3c
-
SSDEEP
49152:8VORjZhBfJXAE9oospduF/OsdKb0nGv4nwMmDTEnyiVranvt:cORjZhBfKEACOoRbNc6ymUt
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 664 rundll32.exe 664 rundll32.exe 664 rundll32.exe 664 rundll32.exe 1592 rundll32.exe 1592 rundll32.exe 1592 rundll32.exe 1592 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1220 1160 235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe 28 PID 1160 wrote to memory of 1220 1160 235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe 28 PID 1160 wrote to memory of 1220 1160 235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe 28 PID 1160 wrote to memory of 1220 1160 235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe 28 PID 1220 wrote to memory of 664 1220 control.exe 29 PID 1220 wrote to memory of 664 1220 control.exe 29 PID 1220 wrote to memory of 664 1220 control.exe 29 PID 1220 wrote to memory of 664 1220 control.exe 29 PID 1220 wrote to memory of 664 1220 control.exe 29 PID 1220 wrote to memory of 664 1220 control.exe 29 PID 1220 wrote to memory of 664 1220 control.exe 29 PID 664 wrote to memory of 888 664 rundll32.exe 30 PID 664 wrote to memory of 888 664 rundll32.exe 30 PID 664 wrote to memory of 888 664 rundll32.exe 30 PID 664 wrote to memory of 888 664 rundll32.exe 30 PID 888 wrote to memory of 1592 888 RunDll32.exe 31 PID 888 wrote to memory of 1592 888 RunDll32.exe 31 PID 888 wrote to memory of 1592 888 RunDll32.exe 31 PID 888 wrote to memory of 1592 888 RunDll32.exe 31 PID 888 wrote to memory of 1592 888 RunDll32.exe 31 PID 888 wrote to memory of 1592 888 RunDll32.exe 31 PID 888 wrote to memory of 1592 888 RunDll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe"C:\Users\Admin\AppData\Local\Temp\235a41a815dd63787ae010eba18cf2243bf5e97e3106b006e0fb2cdd8184c4da.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\GClj1Q8.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\GClj1Q8.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\GClj1Q8.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\GClj1Q8.CPL",5⤵
- Loads dropped DLL
PID:1592
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e
-
Filesize
1.6MB
MD533842f978dcdd1dee32af36046148fd0
SHA127e0477d6bd241c4394706fbadd6a636d7d0fe79
SHA256577dbde35cb7edb61cacca0b0eeaf34ba5a24bc511394d32cc71ba83cb63faa1
SHA512fbf1092789f17ca885b1c39b718df2cfde01b223467ebd75b5a10687f3c9026bd619a7df79da3fe7ac6abf35321b01e5a02f0b0803fb1efe9a74eb3403f50a6e