Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
29-12-2022 00:05
Static task
static1
Behavioral task
behavioral1
Sample
198a5cd3443c764b0fd3a665ea25263846606f69740edcc6e7dca568a1321e1d.exe
Resource
win10-20220901-en
General
-
Target
198a5cd3443c764b0fd3a665ea25263846606f69740edcc6e7dca568a1321e1d.exe
-
Size
1.6MB
-
MD5
202f917224534a77a32b3e2c15e60804
-
SHA1
fe8a86d76a34f8d5a8091e9b187e9e4c26e0245c
-
SHA256
198a5cd3443c764b0fd3a665ea25263846606f69740edcc6e7dca568a1321e1d
-
SHA512
35ed3fdbf67ee86b2e2e2703fff7c2c9c1d9f32ad15f3d16548aa8a5eefddc4be9b57f9f08b1a9c290684a317116613d94d63bbd2503f96b94e1c32a277ab07e
-
SSDEEP
49152:zun+lZ+8My3cHeuCF+HvF3rhKrQD89ecxb:zKqROHeuCFgF7YED89r
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4604 rundll32.exe 3768 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3500 wrote to memory of 1356 3500 198a5cd3443c764b0fd3a665ea25263846606f69740edcc6e7dca568a1321e1d.exe 66 PID 3500 wrote to memory of 1356 3500 198a5cd3443c764b0fd3a665ea25263846606f69740edcc6e7dca568a1321e1d.exe 66 PID 3500 wrote to memory of 1356 3500 198a5cd3443c764b0fd3a665ea25263846606f69740edcc6e7dca568a1321e1d.exe 66 PID 1356 wrote to memory of 4604 1356 control.exe 67 PID 1356 wrote to memory of 4604 1356 control.exe 67 PID 1356 wrote to memory of 4604 1356 control.exe 67 PID 4604 wrote to memory of 5116 4604 rundll32.exe 68 PID 4604 wrote to memory of 5116 4604 rundll32.exe 68 PID 5116 wrote to memory of 3768 5116 RunDll32.exe 69 PID 5116 wrote to memory of 3768 5116 RunDll32.exe 69 PID 5116 wrote to memory of 3768 5116 RunDll32.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\198a5cd3443c764b0fd3a665ea25263846606f69740edcc6e7dca568a1321e1d.exe"C:\Users\Admin\AppData\Local\Temp\198a5cd3443c764b0fd3a665ea25263846606f69740edcc6e7dca568a1321e1d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\C13vreYh.c2⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\C13vreYh.c3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\C13vreYh.c4⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\C13vreYh.c5⤵
- Loads dropped DLL
PID:3768
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5b17c462e94412450fe2f51270042fc57
SHA131486090a022c7324eaecbce180b8ab83c0fa463
SHA256f5e198abce5a306fd621978b027100343a6e54f1d9293d8998e5a901cc4eb69f
SHA51223bc4b7051b9eb7d50e979e8177b18d2edc30e10c9b0b8949d2c8c2ca4d27ebcff58653fb0460cb45ced21db0181a072abb7c0aef356d012fafee27d6855b7eb
-
Filesize
1.5MB
MD5b17c462e94412450fe2f51270042fc57
SHA131486090a022c7324eaecbce180b8ab83c0fa463
SHA256f5e198abce5a306fd621978b027100343a6e54f1d9293d8998e5a901cc4eb69f
SHA51223bc4b7051b9eb7d50e979e8177b18d2edc30e10c9b0b8949d2c8c2ca4d27ebcff58653fb0460cb45ced21db0181a072abb7c0aef356d012fafee27d6855b7eb
-
Filesize
1.5MB
MD5b17c462e94412450fe2f51270042fc57
SHA131486090a022c7324eaecbce180b8ab83c0fa463
SHA256f5e198abce5a306fd621978b027100343a6e54f1d9293d8998e5a901cc4eb69f
SHA51223bc4b7051b9eb7d50e979e8177b18d2edc30e10c9b0b8949d2c8c2ca4d27ebcff58653fb0460cb45ced21db0181a072abb7c0aef356d012fafee27d6855b7eb