Analysis
-
max time kernel
127s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2022, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe
Resource
win10v2004-20221111-en
General
-
Target
6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe
-
Size
1.6MB
-
MD5
88cf29a0102a905b00caa1e0c20caeb8
-
SHA1
eeac8c5e81b6534f764bb59db21f4bea1662eeb7
-
SHA256
6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2
-
SHA512
74c7a41bed4e868f4bc02f2e82177ec933aca7af68344ffbba145c3a59e92cce13a34da2b7883a12c3d77cbec0bb0eec03b61ce2d5da0854e5d5d21a692129ae
-
SSDEEP
24576:ChvJVJdMs0BWhSX7V10TWOjQc7qnWc+CZGvs1mM29odLqSdtB1WLzJfA1iYqr7/b:S3dWPVYWOv7tCCkmidL91GJfAZS7pPPl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe -
Loads dropped DLL 2 IoCs
pid Process 1572 rundll32.exe 4148 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings 6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2176 wrote to memory of 4496 2176 6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe 81 PID 2176 wrote to memory of 4496 2176 6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe 81 PID 2176 wrote to memory of 4496 2176 6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe 81 PID 4496 wrote to memory of 1572 4496 control.exe 83 PID 4496 wrote to memory of 1572 4496 control.exe 83 PID 4496 wrote to memory of 1572 4496 control.exe 83 PID 1572 wrote to memory of 4132 1572 rundll32.exe 90 PID 1572 wrote to memory of 4132 1572 rundll32.exe 90 PID 4132 wrote to memory of 4148 4132 RunDll32.exe 91 PID 4132 wrote to memory of 4148 4132 RunDll32.exe 91 PID 4132 wrote to memory of 4148 4132 RunDll32.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe"C:\Users\Admin\AppData\Local\Temp\6476f3e4d4699003ac32953f20fc3c57e5dfb9a3e88c60ace4686254a788acf2.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\18TD7ZY2.Cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\18TD7ZY2.Cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\18TD7ZY2.Cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\18TD7ZY2.Cpl",5⤵
- Loads dropped DLL
PID:4148
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD52e4ce512efadb8b3cda385c85a791d72
SHA194f2f845d9b877e9b690f37eeaadef3d635405ae
SHA256f13e32d625504d3f364fd1f8ba6d4580fdebfc602826ace5b780876d36015cc0
SHA512b81b4414c259800b3de4b0b33ef63ba179d168a5690a922ee48e8a87169d9f9eae5e1b33a0a1bc74a68adddcf68bfd027f7ec17375567f089fdc4d6e269cf33f
-
Filesize
1.6MB
MD52e4ce512efadb8b3cda385c85a791d72
SHA194f2f845d9b877e9b690f37eeaadef3d635405ae
SHA256f13e32d625504d3f364fd1f8ba6d4580fdebfc602826ace5b780876d36015cc0
SHA512b81b4414c259800b3de4b0b33ef63ba179d168a5690a922ee48e8a87169d9f9eae5e1b33a0a1bc74a68adddcf68bfd027f7ec17375567f089fdc4d6e269cf33f
-
Filesize
1.6MB
MD52e4ce512efadb8b3cda385c85a791d72
SHA194f2f845d9b877e9b690f37eeaadef3d635405ae
SHA256f13e32d625504d3f364fd1f8ba6d4580fdebfc602826ace5b780876d36015cc0
SHA512b81b4414c259800b3de4b0b33ef63ba179d168a5690a922ee48e8a87169d9f9eae5e1b33a0a1bc74a68adddcf68bfd027f7ec17375567f089fdc4d6e269cf33f