Analysis
-
max time kernel
178s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 10:25
Static task
static1
Behavioral task
behavioral1
Sample
acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe
Resource
win10v2004-20221111-en
General
-
Target
acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe
-
Size
1.4MB
-
MD5
a422f8d7cb2e2d1e97dbddd90fa6b6b0
-
SHA1
f06d23a57d5fa9ad442cc2e5f5ffe5e822c1ee29
-
SHA256
acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6
-
SHA512
9d8d40bdab65fe3e47575ea039aa90ab6d5980c396c163b33e7844ddfa5e20f23437a7a6b21fdcdf086d74d81753dec97f782d56941d9d5167ce57515546ede1
-
SSDEEP
24576:YLeTtjJFtHrKYXBVchKDb9XjuSN2luqAT6LbwoUQ1rhyBYGkLFdCrBRs:YLYkYxsKDtMluqg6LsSy2lFIA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe -
Loads dropped DLL 2 IoCs
pid Process 3468 rundll32.exe 4888 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4272 wrote to memory of 896 4272 acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe 82 PID 4272 wrote to memory of 896 4272 acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe 82 PID 4272 wrote to memory of 896 4272 acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe 82 PID 896 wrote to memory of 3468 896 control.exe 84 PID 896 wrote to memory of 3468 896 control.exe 84 PID 896 wrote to memory of 3468 896 control.exe 84 PID 3468 wrote to memory of 3604 3468 rundll32.exe 85 PID 3468 wrote to memory of 3604 3468 rundll32.exe 85 PID 3604 wrote to memory of 4888 3604 RunDll32.exe 86 PID 3604 wrote to memory of 4888 3604 RunDll32.exe 86 PID 3604 wrote to memory of 4888 3604 RunDll32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe"C:\Users\Admin\AppData\Local\Temp\acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL",5⤵
- Loads dropped DLL
PID:4888
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD50cb01ee57ecddf546164fdf18478b690
SHA1a8c6625a08a0e6c6e54ec2956e50f42b60ce141b
SHA256a132c51fb31232a260d03a299b3e4266d4ec7c43a6fe4a3558f66270cd917439
SHA512a0f12a16fdb7c5715ea03388ffa15606ce9b2c71a01c3f93bcca3274d655a3975a0bac90e70b3e14b7bac71092169750181e2d12d3e15993db9b32c442de9739
-
Filesize
1.6MB
MD50cb01ee57ecddf546164fdf18478b690
SHA1a8c6625a08a0e6c6e54ec2956e50f42b60ce141b
SHA256a132c51fb31232a260d03a299b3e4266d4ec7c43a6fe4a3558f66270cd917439
SHA512a0f12a16fdb7c5715ea03388ffa15606ce9b2c71a01c3f93bcca3274d655a3975a0bac90e70b3e14b7bac71092169750181e2d12d3e15993db9b32c442de9739
-
Filesize
1.6MB
MD50cb01ee57ecddf546164fdf18478b690
SHA1a8c6625a08a0e6c6e54ec2956e50f42b60ce141b
SHA256a132c51fb31232a260d03a299b3e4266d4ec7c43a6fe4a3558f66270cd917439
SHA512a0f12a16fdb7c5715ea03388ffa15606ce9b2c71a01c3f93bcca3274d655a3975a0bac90e70b3e14b7bac71092169750181e2d12d3e15993db9b32c442de9739