Analysis
-
max time kernel
44s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
10/01/2023, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
938c833bec1582e0a26e5266b6b34f96.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
938c833bec1582e0a26e5266b6b34f96.dll
Resource
win10v2004-20220812-en
General
-
Target
938c833bec1582e0a26e5266b6b34f96.dll
-
Size
156KB
-
MD5
938c833bec1582e0a26e5266b6b34f96
-
SHA1
0d1f053fb127b380d68eeca276ed95af4fc17262
-
SHA256
2ee99a16d48e78d04877da7f749da12d6ba252f12c246c709f48c6a187cedc74
-
SHA512
933be6cde4a4a65c9c9ad4bdc7d74cd3cd06d2a8981965d5344868cd62925698d2962cf5b41a50be9bd9a9a7feaf4849586dc747dbd02945c604f6b23f11afa7
-
SSDEEP
3072:RAGbkFt2tUaG195VUxFUjlifno6bzjjuhPVSGPgbRjCoTlEbVXiBRpiD6W/568dn:RAykf6G195VUzUjlivlj6JVIRjVTlEbo
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1100 sc.exe 1408 sc.exe 924 sc.exe 1624 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 59 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1304 1204 rundll32.exe 28 PID 1204 wrote to memory of 1304 1204 rundll32.exe 28 PID 1204 wrote to memory of 1304 1204 rundll32.exe 28 PID 1204 wrote to memory of 1304 1204 rundll32.exe 28 PID 1204 wrote to memory of 1304 1204 rundll32.exe 28 PID 1204 wrote to memory of 1304 1204 rundll32.exe 28 PID 1204 wrote to memory of 1304 1204 rundll32.exe 28 PID 1304 wrote to memory of 2020 1304 rundll32.exe 29 PID 1304 wrote to memory of 2020 1304 rundll32.exe 29 PID 1304 wrote to memory of 2020 1304 rundll32.exe 29 PID 1304 wrote to memory of 2020 1304 rundll32.exe 29 PID 2020 wrote to memory of 1092 2020 WScript.exe 31 PID 2020 wrote to memory of 1092 2020 WScript.exe 31 PID 2020 wrote to memory of 1092 2020 WScript.exe 31 PID 2020 wrote to memory of 1092 2020 WScript.exe 31 PID 1092 wrote to memory of 1992 1092 net.exe 33 PID 1092 wrote to memory of 1992 1092 net.exe 33 PID 1092 wrote to memory of 1992 1092 net.exe 33 PID 1092 wrote to memory of 1992 1092 net.exe 33 PID 2020 wrote to memory of 1408 2020 WScript.exe 34 PID 2020 wrote to memory of 1408 2020 WScript.exe 34 PID 2020 wrote to memory of 1408 2020 WScript.exe 34 PID 2020 wrote to memory of 1408 2020 WScript.exe 34 PID 2020 wrote to memory of 864 2020 WScript.exe 39 PID 2020 wrote to memory of 864 2020 WScript.exe 39 PID 2020 wrote to memory of 864 2020 WScript.exe 39 PID 2020 wrote to memory of 864 2020 WScript.exe 39 PID 2020 wrote to memory of 1132 2020 WScript.exe 41 PID 2020 wrote to memory of 1132 2020 WScript.exe 41 PID 2020 wrote to memory of 1132 2020 WScript.exe 41 PID 2020 wrote to memory of 1132 2020 WScript.exe 41 PID 864 wrote to memory of 924 864 cmd.exe 43 PID 864 wrote to memory of 924 864 cmd.exe 43 PID 864 wrote to memory of 924 864 cmd.exe 43 PID 864 wrote to memory of 924 864 cmd.exe 43 PID 1132 wrote to memory of 1624 1132 cmd.exe 44 PID 1132 wrote to memory of 1624 1132 cmd.exe 44 PID 1132 wrote to memory of 1624 1132 cmd.exe 44 PID 1132 wrote to memory of 1624 1132 cmd.exe 44 PID 2020 wrote to memory of 904 2020 WScript.exe 45 PID 2020 wrote to memory of 904 2020 WScript.exe 45 PID 2020 wrote to memory of 904 2020 WScript.exe 45 PID 2020 wrote to memory of 904 2020 WScript.exe 45 PID 2020 wrote to memory of 1356 2020 WScript.exe 47 PID 2020 wrote to memory of 1356 2020 WScript.exe 47 PID 2020 wrote to memory of 1356 2020 WScript.exe 47 PID 2020 wrote to memory of 1356 2020 WScript.exe 47 PID 904 wrote to memory of 1556 904 net.exe 48 PID 904 wrote to memory of 1556 904 net.exe 48 PID 904 wrote to memory of 1556 904 net.exe 48 PID 904 wrote to memory of 1556 904 net.exe 48 PID 2020 wrote to memory of 1100 2020 WScript.exe 50 PID 2020 wrote to memory of 1100 2020 WScript.exe 50 PID 2020 wrote to memory of 1100 2020 WScript.exe 50 PID 2020 wrote to memory of 1100 2020 WScript.exe 50 PID 2020 wrote to memory of 1484 2020 WScript.exe 52 PID 2020 wrote to memory of 1484 2020 WScript.exe 52 PID 2020 wrote to memory of 1484 2020 WScript.exe 52 PID 2020 wrote to memory of 1484 2020 WScript.exe 52
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\938c833bec1582e0a26e5266b6b34f96.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\938c833bec1582e0a26e5266b6b34f96.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\windows\temp\temp.vbs"3⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop AdobeFlashPlayerHash4⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AdobeFlashPlayerHash5⤵PID:1992
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" delete AdobeFlashPlayerHash4⤵
- Launches sc.exe
PID:1408
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Sc create AdobeFlashPlayerHash binpath= "C:\Program Files\WindowsDefender\MdCmdRun.exe" start= auto4⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\sc.exeSc create AdobeFlashPlayerHash binpath= "C:\Program Files\WindowsDefender\MdCmdRun.exe" start= auto5⤵
- Launches sc.exe
PID:924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config AdobeFlashPlayerHash DisplayName= "Remote Packet Capture Protocol v.1" start= auto4⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\sc.exesc config AdobeFlashPlayerHash DisplayName= "Remote Packet Capture Protocol v.1" start= auto5⤵
- Launches sc.exe
PID:1624
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start AdobeFlashPlayerHash4⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start AdobeFlashPlayerHash5⤵PID:1556
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\loads.exe"4⤵PID:1356
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" delete SRPolicySvc4⤵
- Launches sc.exe
PID:1100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Program Files\WindowsDefender\Install_CM.exe"4⤵PID:1484
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD57d067386217b62aeaa178a39a93c020c
SHA1e45883e3c04a8d2a9b54b93aa338c9ab40310e3a
SHA25634f853f771e922cec41dbd897f7c284391a103f6c00022b866662749e0cd5a76
SHA51234affb0c932a7834fbf3cbbc9b97bcf756cfcc96e1da7b1304f8178b04f4e42a86bb6b37818c7cdb0df2b884ba7ca496a039183dfa4f742a8272a963a3c73254