Analysis
-
max time kernel
125s -
max time network
174s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
11/02/2023, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf.exe
Resource
win10-20220812-en
General
-
Target
ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf.exe
-
Size
1.5MB
-
MD5
ebb5fd844eebe3542e853c6e3fb672e0
-
SHA1
f144747c6261ef7a2c0cec1edf49cbe618df856a
-
SHA256
ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf
-
SHA512
3dff4b2d89192b39627728c63058043d2ddb65ad75cbfaa97037cb975ff46a30453d1a628996cf9b76250a65cc7b226cb1378cac733cbd382c70af4240f4cce5
-
SSDEEP
24576:5eRz2pFX1dEEAnUpLPImbWWxlSqxI+sqixtaZr/istzRYbiIq3ulL+n0KzVyzaCk:NPPhNZxI+snsZr19RYBt+0KvCnNC
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3644 rundll32.exe 4580 rundll32.exe 4580 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1099808672-3828198950-1535142148-1000_Classes\Local Settings ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4236 2772 ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf.exe 66 PID 2772 wrote to memory of 4236 2772 ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf.exe 66 PID 2772 wrote to memory of 4236 2772 ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf.exe 66 PID 4236 wrote to memory of 3644 4236 control.exe 68 PID 4236 wrote to memory of 3644 4236 control.exe 68 PID 4236 wrote to memory of 3644 4236 control.exe 68 PID 3644 wrote to memory of 2288 3644 rundll32.exe 69 PID 3644 wrote to memory of 2288 3644 rundll32.exe 69 PID 2288 wrote to memory of 4580 2288 RunDll32.exe 70 PID 2288 wrote to memory of 4580 2288 RunDll32.exe 70 PID 2288 wrote to memory of 4580 2288 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf.exe"C:\Users\Admin\AppData\Local\Temp\ef8ac2bdc40d428d75034c7c517f30bae17906e9584809c0f433ef20175acfcf.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Du9IT.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Du9IT.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Du9IT.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Du9IT.CpL",5⤵
- Loads dropped DLL
PID:4580
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD583a5962c802d2af077a0b30b9c781884
SHA1c8b434dd62b0203e5228ee99d6f2d451265ff19e
SHA2566ad1ed2332cc5e752a15dab4685cdd1f4ad238cdb967e03ce8ce7a7cefa0422b
SHA512449e8b806389f5c16bf22885c22a9426cbab43689536cc6064329aebed056530fb19045456f435a6c2010bf7c7e8d5816247fa7f7776cacedbe60edfb50529be
-
Filesize
1.4MB
MD583a5962c802d2af077a0b30b9c781884
SHA1c8b434dd62b0203e5228ee99d6f2d451265ff19e
SHA2566ad1ed2332cc5e752a15dab4685cdd1f4ad238cdb967e03ce8ce7a7cefa0422b
SHA512449e8b806389f5c16bf22885c22a9426cbab43689536cc6064329aebed056530fb19045456f435a6c2010bf7c7e8d5816247fa7f7776cacedbe60edfb50529be
-
Filesize
1.4MB
MD583a5962c802d2af077a0b30b9c781884
SHA1c8b434dd62b0203e5228ee99d6f2d451265ff19e
SHA2566ad1ed2332cc5e752a15dab4685cdd1f4ad238cdb967e03ce8ce7a7cefa0422b
SHA512449e8b806389f5c16bf22885c22a9426cbab43689536cc6064329aebed056530fb19045456f435a6c2010bf7c7e8d5816247fa7f7776cacedbe60edfb50529be
-
Filesize
1.4MB
MD583a5962c802d2af077a0b30b9c781884
SHA1c8b434dd62b0203e5228ee99d6f2d451265ff19e
SHA2566ad1ed2332cc5e752a15dab4685cdd1f4ad238cdb967e03ce8ce7a7cefa0422b
SHA512449e8b806389f5c16bf22885c22a9426cbab43689536cc6064329aebed056530fb19045456f435a6c2010bf7c7e8d5816247fa7f7776cacedbe60edfb50529be