Analysis

  • max time kernel
    53s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-12-2022 04:21

General

  • Target

    90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe

  • Size

    1.5MB

  • MD5

    6512c1aa3e27e6e654bd70bc62abda55

  • SHA1

    dc9b931f94df632f97b701f72091bff427fae8e5

  • SHA256

    90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367

  • SHA512

    c1e754b49ce46f74f502fc521901ae080690b0b6de98862098bcd1edd7ac8bbf14626f429f6213bd1b1445d5d650411cccaefbde8e6ec324c31bbb0847f5cd16

  • SSDEEP

    24576:rconAINPy/CTBf48FOMsH4Wckji+rTqaAdTRqn56/r30woFE7EqjT:bRxFf3sYWDTNA5Rqn56T3mqjT

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe
    "C:\Users\Admin\AppData\Local\Temp\90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4956
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4084
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL",
            5⤵
            • Loads dropped DLL
            PID:4236

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL

    Filesize

    1.3MB

    MD5

    5f1f3eacda007e5b9c5799c4fe4788c4

    SHA1

    8d36a812dc51705b4272f8222cae29aac3956898

    SHA256

    8f5f0e8056e441adf90c5410cadb6407de7275075882e2d08d0738b66325f590

    SHA512

    d65f7956a1f7792a801b873dfa8e931b087508792735dd89f3a431cc1efa5fb5cbf71f0c1fc8f845d8545250d4bbe49904a03c342ed280553567d02a1e2e721f

  • \Users\Admin\AppData\Local\Temp\DKDH5aR.cpl

    Filesize

    1.3MB

    MD5

    5f1f3eacda007e5b9c5799c4fe4788c4

    SHA1

    8d36a812dc51705b4272f8222cae29aac3956898

    SHA256

    8f5f0e8056e441adf90c5410cadb6407de7275075882e2d08d0738b66325f590

    SHA512

    d65f7956a1f7792a801b873dfa8e931b087508792735dd89f3a431cc1efa5fb5cbf71f0c1fc8f845d8545250d4bbe49904a03c342ed280553567d02a1e2e721f

  • \Users\Admin\AppData\Local\Temp\DKDH5aR.cpl

    Filesize

    1.3MB

    MD5

    5f1f3eacda007e5b9c5799c4fe4788c4

    SHA1

    8d36a812dc51705b4272f8222cae29aac3956898

    SHA256

    8f5f0e8056e441adf90c5410cadb6407de7275075882e2d08d0738b66325f590

    SHA512

    d65f7956a1f7792a801b873dfa8e931b087508792735dd89f3a431cc1efa5fb5cbf71f0c1fc8f845d8545250d4bbe49904a03c342ed280553567d02a1e2e721f

  • \Users\Admin\AppData\Local\Temp\DKDH5aR.cpl

    Filesize

    1.3MB

    MD5

    5f1f3eacda007e5b9c5799c4fe4788c4

    SHA1

    8d36a812dc51705b4272f8222cae29aac3956898

    SHA256

    8f5f0e8056e441adf90c5410cadb6407de7275075882e2d08d0738b66325f590

    SHA512

    d65f7956a1f7792a801b873dfa8e931b087508792735dd89f3a431cc1efa5fb5cbf71f0c1fc8f845d8545250d4bbe49904a03c342ed280553567d02a1e2e721f

  • memory/3068-151-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-124-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-119-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-153-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-122-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-154-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-125-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-126-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-127-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-128-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-129-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-131-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-130-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-132-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-134-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-133-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-135-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-136-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-137-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-138-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-139-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-140-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-141-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-142-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-143-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-144-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-145-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-146-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-147-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-149-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-148-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-150-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-117-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-152-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-121-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-155-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-118-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-156-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-157-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-158-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-159-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-160-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-161-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-162-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-163-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-164-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-165-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-167-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-166-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-169-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-168-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-170-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-171-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-172-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-173-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-174-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-175-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-176-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-177-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-178-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-179-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-180-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-181-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/3068-116-0x0000000076FE0000-0x000000007716E000-memory.dmp

    Filesize

    1.6MB

  • memory/4236-345-0x0000000003000000-0x00000000030AE000-memory.dmp

    Filesize

    696KB

  • memory/4236-346-0x0000000003000000-0x00000000030AE000-memory.dmp

    Filesize

    696KB

  • memory/4956-281-0x0000000002690000-0x0000000002696000-memory.dmp

    Filesize

    24KB