Analysis

  • max time kernel
    44s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    10/01/2023, 15:11

General

  • Target

    938c833bec1582e0a26e5266b6b34f96.dll

  • Size

    156KB

  • MD5

    938c833bec1582e0a26e5266b6b34f96

  • SHA1

    0d1f053fb127b380d68eeca276ed95af4fc17262

  • SHA256

    2ee99a16d48e78d04877da7f749da12d6ba252f12c246c709f48c6a187cedc74

  • SHA512

    933be6cde4a4a65c9c9ad4bdc7d74cd3cd06d2a8981965d5344868cd62925698d2962cf5b41a50be9bd9a9a7feaf4849586dc747dbd02945c604f6b23f11afa7

  • SSDEEP

    3072:RAGbkFt2tUaG195VUxFUjlifno6bzjjuhPVSGPgbRjCoTlEbVXiBRpiD6W/568dn:RAykf6G195VUzUjlivlj6JVIRjVTlEbo

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Stops running service(s) 3 TTPs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 59 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\938c833bec1582e0a26e5266b6b34f96.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\938c833bec1582e0a26e5266b6b34f96.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\windows\temp\temp.vbs"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\System32\net.exe" stop AdobeFlashPlayerHash
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1092
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop AdobeFlashPlayerHash
            5⤵
              PID:1992
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" delete AdobeFlashPlayerHash
            4⤵
            • Launches sc.exe
            PID:1408
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c Sc create AdobeFlashPlayerHash binpath= "C:\Program Files\WindowsDefender\MdCmdRun.exe" start= auto
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:864
            • C:\Windows\SysWOW64\sc.exe
              Sc create AdobeFlashPlayerHash binpath= "C:\Program Files\WindowsDefender\MdCmdRun.exe" start= auto
              5⤵
              • Launches sc.exe
              PID:924
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c sc config AdobeFlashPlayerHash DisplayName= "Remote Packet Capture Protocol v.1" start= auto
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1132
            • C:\Windows\SysWOW64\sc.exe
              sc config AdobeFlashPlayerHash DisplayName= "Remote Packet Capture Protocol v.1" start= auto
              5⤵
              • Launches sc.exe
              PID:1624
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\System32\net.exe" start AdobeFlashPlayerHash
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:904
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start AdobeFlashPlayerHash
              5⤵
                PID:1556
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c "C:\ProgramData\loads.exe"
              4⤵
                PID:1356
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" delete SRPolicySvc
                4⤵
                • Launches sc.exe
                PID:1100
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c "C:\Program Files\WindowsDefender\Install_CM.exe"
                4⤵
                  PID:1484

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\windows\temp\temp.vbs

            Filesize

            73KB

            MD5

            7d067386217b62aeaa178a39a93c020c

            SHA1

            e45883e3c04a8d2a9b54b93aa338c9ab40310e3a

            SHA256

            34f853f771e922cec41dbd897f7c284391a103f6c00022b866662749e0cd5a76

            SHA512

            34affb0c932a7834fbf3cbbc9b97bcf756cfcc96e1da7b1304f8178b04f4e42a86bb6b37818c7cdb0df2b884ba7ca496a039183dfa4f742a8272a963a3c73254

          • memory/1304-55-0x00000000753F1000-0x00000000753F3000-memory.dmp

            Filesize

            8KB