Analysis
-
max time kernel
150s -
max time network
62s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27-12-2022 00:20
Static task
static1
Behavioral task
behavioral1
Sample
cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc.exe
Resource
win10-20220812-en
General
-
Target
cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc.exe
-
Size
1.7MB
-
MD5
39fa68973af1c0d337504dc5f5a78c19
-
SHA1
ef0a813e0667a0fd0bb7f3856a3a43f910fd07b8
-
SHA256
cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc
-
SHA512
25c944174c1387c881ed5b01e25f7190519fbdca7a8e51f7f1de87954b7f2aded3bdff65c30294e68b3c1512ce1f38ae7b7d62c030ee214ffcbee08f3398c538
-
SSDEEP
49152:084cPIOD7j5EfFtmwLWwzshG41qQfMqhyf3hVEtg:6cPIOD7jWfWwLWwz8G4xfMqhyJVEa
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4764 rundll32.exe 3048 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3824 wrote to memory of 3456 3824 cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc.exe 67 PID 3824 wrote to memory of 3456 3824 cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc.exe 67 PID 3824 wrote to memory of 3456 3824 cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc.exe 67 PID 3456 wrote to memory of 4764 3456 control.exe 69 PID 3456 wrote to memory of 4764 3456 control.exe 69 PID 3456 wrote to memory of 4764 3456 control.exe 69 PID 4764 wrote to memory of 4716 4764 rundll32.exe 70 PID 4764 wrote to memory of 4716 4764 rundll32.exe 70 PID 4716 wrote to memory of 3048 4716 RunDll32.exe 71 PID 4716 wrote to memory of 3048 4716 RunDll32.exe 71 PID 4716 wrote to memory of 3048 4716 RunDll32.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc.exe"C:\Users\Admin\AppData\Local\Temp\cf9f7872dd9109d9e11f39184d19fc93f74b9c5411681c6881a12415eb0751fc.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\BV7TV.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BV7TV.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BV7TV.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\BV7TV.CPl",5⤵
- Loads dropped DLL
PID:3048
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ac5fc984f91784330c3fe570fc2d2904
SHA1805fb0e284ce964335559a01e2ed9c3da70604b7
SHA25665074cc409f4d1947ab4fd51d01c15db063cca4cbf7818d2e21d3bb4d43d6e54
SHA51275b88512e3dc4955d0210502ee17e5414542d1c1b80bd65ebcaa0ad52ef1c6dcb4f9f84333d7b619ef7fcea260e97e32d18a2d5dc6555d167c550bfabfee37f6
-
Filesize
1.7MB
MD5ac5fc984f91784330c3fe570fc2d2904
SHA1805fb0e284ce964335559a01e2ed9c3da70604b7
SHA25665074cc409f4d1947ab4fd51d01c15db063cca4cbf7818d2e21d3bb4d43d6e54
SHA51275b88512e3dc4955d0210502ee17e5414542d1c1b80bd65ebcaa0ad52ef1c6dcb4f9f84333d7b619ef7fcea260e97e32d18a2d5dc6555d167c550bfabfee37f6
-
Filesize
1.7MB
MD5ac5fc984f91784330c3fe570fc2d2904
SHA1805fb0e284ce964335559a01e2ed9c3da70604b7
SHA25665074cc409f4d1947ab4fd51d01c15db063cca4cbf7818d2e21d3bb4d43d6e54
SHA51275b88512e3dc4955d0210502ee17e5414542d1c1b80bd65ebcaa0ad52ef1c6dcb4f9f84333d7b619ef7fcea260e97e32d18a2d5dc6555d167c550bfabfee37f6