Analysis
-
max time kernel
60s -
max time network
68s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
11/02/2023, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318.exe
Resource
win10-20220901-en
General
-
Target
579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318.exe
-
Size
1.5MB
-
MD5
bf316a2fc6cc65d6fe1f0a00c29d5b0f
-
SHA1
ca2314690eb12dbfa19ed739d59e7a7c01915275
-
SHA256
579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318
-
SHA512
ff0009019a9abd22a320467da4e93ea8958e470f54273d3dbafed79b3a227da005b5b8eeff075095caa7eb02487ead840d7e035152c8df22af13532be446ebdf
-
SSDEEP
24576:9GHCm8uPdJmX2E3Ix3kvoOGtzZ1hEzjDjUYh810gL83oATteaErnLTXU8T:EuWxTZ6oOGtN3uUYh810gXktFenLTEE
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3528 rundll32.exe 3528 rundll32.exe 1876 rundll32.exe 1876 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings 579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2704 wrote to memory of 1296 2704 579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318.exe 66 PID 2704 wrote to memory of 1296 2704 579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318.exe 66 PID 2704 wrote to memory of 1296 2704 579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318.exe 66 PID 1296 wrote to memory of 3528 1296 control.exe 68 PID 1296 wrote to memory of 3528 1296 control.exe 68 PID 1296 wrote to memory of 3528 1296 control.exe 68 PID 3528 wrote to memory of 4416 3528 rundll32.exe 69 PID 3528 wrote to memory of 4416 3528 rundll32.exe 69 PID 4416 wrote to memory of 1876 4416 RunDll32.exe 70 PID 4416 wrote to memory of 1876 4416 RunDll32.exe 70 PID 4416 wrote to memory of 1876 4416 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318.exe"C:\Users\Admin\AppData\Local\Temp\579b99b3d4e55222874ede30594973e5b3f725ac239292b1f7e05990b6086318.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\R0CLC5~8.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\R0CLC5~8.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\R0CLC5~8.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\R0CLC5~8.CPL",5⤵
- Loads dropped DLL
PID:1876
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5f09cf527ef833e29a17e96cc0dc62efd
SHA1c632cb31800daaa2c4e266e030129dd2dc23e204
SHA256499ac68774044753a6704a53b9565737c5c42796f22dbdfe93f63ae70a0496e1
SHA512c54911b7739ac80a91a6c6f5be767ae589d7b382f77ca7ad732ff6839410c1b172656230c4e66dacd45110adf27e2ef6e2d585036fec74a9796987bd091190bb
-
Filesize
1.6MB
MD5f09cf527ef833e29a17e96cc0dc62efd
SHA1c632cb31800daaa2c4e266e030129dd2dc23e204
SHA256499ac68774044753a6704a53b9565737c5c42796f22dbdfe93f63ae70a0496e1
SHA512c54911b7739ac80a91a6c6f5be767ae589d7b382f77ca7ad732ff6839410c1b172656230c4e66dacd45110adf27e2ef6e2d585036fec74a9796987bd091190bb
-
Filesize
1.6MB
MD5f09cf527ef833e29a17e96cc0dc62efd
SHA1c632cb31800daaa2c4e266e030129dd2dc23e204
SHA256499ac68774044753a6704a53b9565737c5c42796f22dbdfe93f63ae70a0496e1
SHA512c54911b7739ac80a91a6c6f5be767ae589d7b382f77ca7ad732ff6839410c1b172656230c4e66dacd45110adf27e2ef6e2d585036fec74a9796987bd091190bb
-
Filesize
1.6MB
MD5f09cf527ef833e29a17e96cc0dc62efd
SHA1c632cb31800daaa2c4e266e030129dd2dc23e204
SHA256499ac68774044753a6704a53b9565737c5c42796f22dbdfe93f63ae70a0496e1
SHA512c54911b7739ac80a91a6c6f5be767ae589d7b382f77ca7ad732ff6839410c1b172656230c4e66dacd45110adf27e2ef6e2d585036fec74a9796987bd091190bb
-
Filesize
1.6MB
MD5f09cf527ef833e29a17e96cc0dc62efd
SHA1c632cb31800daaa2c4e266e030129dd2dc23e204
SHA256499ac68774044753a6704a53b9565737c5c42796f22dbdfe93f63ae70a0496e1
SHA512c54911b7739ac80a91a6c6f5be767ae589d7b382f77ca7ad732ff6839410c1b172656230c4e66dacd45110adf27e2ef6e2d585036fec74a9796987bd091190bb