Analysis
-
max time kernel
53s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
31-12-2022 04:21
Static task
static1
Behavioral task
behavioral1
Sample
90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe
Resource
win10-20220812-en
General
-
Target
90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe
-
Size
1.5MB
-
MD5
6512c1aa3e27e6e654bd70bc62abda55
-
SHA1
dc9b931f94df632f97b701f72091bff427fae8e5
-
SHA256
90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367
-
SHA512
c1e754b49ce46f74f502fc521901ae080690b0b6de98862098bcd1edd7ac8bbf14626f429f6213bd1b1445d5d650411cccaefbde8e6ec324c31bbb0847f5cd16
-
SSDEEP
24576:rconAINPy/CTBf48FOMsH4Wckji+rTqaAdTRqn56/r30woFE7EqjT:bRxFf3sYWDTNA5Rqn56T3mqjT
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4956 rundll32.exe 4956 rundll32.exe 4236 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings 90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3068 wrote to memory of 4040 3068 90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe 66 PID 3068 wrote to memory of 4040 3068 90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe 66 PID 3068 wrote to memory of 4040 3068 90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe 66 PID 4040 wrote to memory of 4956 4040 control.exe 68 PID 4040 wrote to memory of 4956 4040 control.exe 68 PID 4040 wrote to memory of 4956 4040 control.exe 68 PID 4956 wrote to memory of 4084 4956 rundll32.exe 69 PID 4956 wrote to memory of 4084 4956 rundll32.exe 69 PID 4084 wrote to memory of 4236 4084 RunDll32.exe 70 PID 4084 wrote to memory of 4236 4084 RunDll32.exe 70 PID 4084 wrote to memory of 4236 4084 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe"C:\Users\Admin\AppData\Local\Temp\90e92e5d7fadd884919d923b75d14c28cb063cd761e5c8be8fc52146838b8367.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL",2⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL",4⤵
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\DKDH5aR.cpL",5⤵
- Loads dropped DLL
PID:4236
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD55f1f3eacda007e5b9c5799c4fe4788c4
SHA18d36a812dc51705b4272f8222cae29aac3956898
SHA2568f5f0e8056e441adf90c5410cadb6407de7275075882e2d08d0738b66325f590
SHA512d65f7956a1f7792a801b873dfa8e931b087508792735dd89f3a431cc1efa5fb5cbf71f0c1fc8f845d8545250d4bbe49904a03c342ed280553567d02a1e2e721f
-
Filesize
1.3MB
MD55f1f3eacda007e5b9c5799c4fe4788c4
SHA18d36a812dc51705b4272f8222cae29aac3956898
SHA2568f5f0e8056e441adf90c5410cadb6407de7275075882e2d08d0738b66325f590
SHA512d65f7956a1f7792a801b873dfa8e931b087508792735dd89f3a431cc1efa5fb5cbf71f0c1fc8f845d8545250d4bbe49904a03c342ed280553567d02a1e2e721f
-
Filesize
1.3MB
MD55f1f3eacda007e5b9c5799c4fe4788c4
SHA18d36a812dc51705b4272f8222cae29aac3956898
SHA2568f5f0e8056e441adf90c5410cadb6407de7275075882e2d08d0738b66325f590
SHA512d65f7956a1f7792a801b873dfa8e931b087508792735dd89f3a431cc1efa5fb5cbf71f0c1fc8f845d8545250d4bbe49904a03c342ed280553567d02a1e2e721f
-
Filesize
1.3MB
MD55f1f3eacda007e5b9c5799c4fe4788c4
SHA18d36a812dc51705b4272f8222cae29aac3956898
SHA2568f5f0e8056e441adf90c5410cadb6407de7275075882e2d08d0738b66325f590
SHA512d65f7956a1f7792a801b873dfa8e931b087508792735dd89f3a431cc1efa5fb5cbf71f0c1fc8f845d8545250d4bbe49904a03c342ed280553567d02a1e2e721f