Analysis

  • max time kernel
    178s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/02/2023, 10:25

General

  • Target

    acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe

  • Size

    1.4MB

  • MD5

    a422f8d7cb2e2d1e97dbddd90fa6b6b0

  • SHA1

    f06d23a57d5fa9ad442cc2e5f5ffe5e822c1ee29

  • SHA256

    acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6

  • SHA512

    9d8d40bdab65fe3e47575ea039aa90ab6d5980c396c163b33e7844ddfa5e20f23437a7a6b21fdcdf086d74d81753dec97f782d56941d9d5167ce57515546ede1

  • SSDEEP

    24576:YLeTtjJFtHrKYXBVchKDb9XjuSN2luqAT6LbwoUQ1rhyBYGkLFdCrBRs:YLYkYxsKDtMluqg6LsSy2lFIA

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe
    "C:\Users\Admin\AppData\Local\Temp\acb074b56ae323d4c952b6ea6881fa6e76fbda0ca063c103860176d5d9deace6.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3468
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3604
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL",
            5⤵
            • Loads dropped DLL
            PID:4888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WRBWb.cPL

    Filesize

    1.6MB

    MD5

    0cb01ee57ecddf546164fdf18478b690

    SHA1

    a8c6625a08a0e6c6e54ec2956e50f42b60ce141b

    SHA256

    a132c51fb31232a260d03a299b3e4266d4ec7c43a6fe4a3558f66270cd917439

    SHA512

    a0f12a16fdb7c5715ea03388ffa15606ce9b2c71a01c3f93bcca3274d655a3975a0bac90e70b3e14b7bac71092169750181e2d12d3e15993db9b32c442de9739

  • C:\Users\Admin\AppData\Local\Temp\wRbWb.cpl

    Filesize

    1.6MB

    MD5

    0cb01ee57ecddf546164fdf18478b690

    SHA1

    a8c6625a08a0e6c6e54ec2956e50f42b60ce141b

    SHA256

    a132c51fb31232a260d03a299b3e4266d4ec7c43a6fe4a3558f66270cd917439

    SHA512

    a0f12a16fdb7c5715ea03388ffa15606ce9b2c71a01c3f93bcca3274d655a3975a0bac90e70b3e14b7bac71092169750181e2d12d3e15993db9b32c442de9739

  • C:\Users\Admin\AppData\Local\Temp\wRbWb.cpl

    Filesize

    1.6MB

    MD5

    0cb01ee57ecddf546164fdf18478b690

    SHA1

    a8c6625a08a0e6c6e54ec2956e50f42b60ce141b

    SHA256

    a132c51fb31232a260d03a299b3e4266d4ec7c43a6fe4a3558f66270cd917439

    SHA512

    a0f12a16fdb7c5715ea03388ffa15606ce9b2c71a01c3f93bcca3274d655a3975a0bac90e70b3e14b7bac71092169750181e2d12d3e15993db9b32c442de9739

  • memory/3468-140-0x0000000002FB0000-0x00000000030AC000-memory.dmp

    Filesize

    1008KB

  • memory/3468-139-0x0000000002A10000-0x0000000002A16000-memory.dmp

    Filesize

    24KB

  • memory/3468-136-0x0000000000400000-0x000000000059D000-memory.dmp

    Filesize

    1.6MB

  • memory/3468-141-0x00000000030C0000-0x00000000031A3000-memory.dmp

    Filesize

    908KB

  • memory/4888-150-0x00000000014D0000-0x00000000014D6000-memory.dmp

    Filesize

    24KB

  • memory/4888-151-0x0000000003580000-0x000000000367C000-memory.dmp

    Filesize

    1008KB

  • memory/4888-152-0x0000000003680000-0x0000000003763000-memory.dmp

    Filesize

    908KB