Analysis
-
max time kernel
50s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16/02/2023, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
eafacef9dbb5b198a8f7056fbe48682d746989c195253e654d0bad48a266f6ca.exe
Resource
win10-20220812-en
General
-
Target
eafacef9dbb5b198a8f7056fbe48682d746989c195253e654d0bad48a266f6ca.exe
-
Size
1.3MB
-
MD5
f0f0e3d4cb1df8617ee4722ca83fb0b0
-
SHA1
6fd03e12412ebc57cc25b8b5188df053fdd690a7
-
SHA256
eafacef9dbb5b198a8f7056fbe48682d746989c195253e654d0bad48a266f6ca
-
SHA512
5f4d2f2e4bcc0bbed135fd841fdb8f6c958b20b5931f35d1773c73b5f33cd7f6689c4ba5e9ae0d991654f0e43ec99046756d3898f1c6223f8d81ad9bd0e41241
-
SSDEEP
24576:JLllLl7tEtWWirGCgOHpjhkLoubAF/xqxtZeGm5LpSUgWx1:hllL8bqFhkLoGAJCZeXxaWX
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 3052 rundll32.exe 3760 rundll32.exe 3760 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2132 wrote to memory of 4924 2132 eafacef9dbb5b198a8f7056fbe48682d746989c195253e654d0bad48a266f6ca.exe 66 PID 2132 wrote to memory of 4924 2132 eafacef9dbb5b198a8f7056fbe48682d746989c195253e654d0bad48a266f6ca.exe 66 PID 2132 wrote to memory of 4924 2132 eafacef9dbb5b198a8f7056fbe48682d746989c195253e654d0bad48a266f6ca.exe 66 PID 4924 wrote to memory of 3052 4924 control.exe 67 PID 4924 wrote to memory of 3052 4924 control.exe 67 PID 4924 wrote to memory of 3052 4924 control.exe 67 PID 3052 wrote to memory of 1804 3052 rundll32.exe 68 PID 3052 wrote to memory of 1804 3052 rundll32.exe 68 PID 1804 wrote to memory of 3760 1804 RunDll32.exe 69 PID 1804 wrote to memory of 3760 1804 RunDll32.exe 69 PID 1804 wrote to memory of 3760 1804 RunDll32.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\eafacef9dbb5b198a8f7056fbe48682d746989c195253e654d0bad48a266f6ca.exe"C:\Users\Admin\AppData\Local\Temp\eafacef9dbb5b198a8f7056fbe48682d746989c195253e654d0bad48a266f6ca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\RnZgL.A2⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\RnZgL.A3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\RnZgL.A4⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\RnZgL.A5⤵
- Loads dropped DLL
PID:3760
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD566559b84af3fd055d79f9bd2d1e852fa
SHA16d01feaf4f257d1d6d17a5f8e929d8da8c55d00d
SHA2561e7ee51ec163a02e000b3d7848bf1da6abcf276dc4efc996b6e577512ce55f55
SHA512d66d388d606631322da46fd4e74cb262b00fad72fee5167971f862e7d228c9f3c7061b399eeb2ba09a2e4f667cf91f7695eb0169c76e589d520975cbf54b72b9
-
Filesize
1.2MB
MD566559b84af3fd055d79f9bd2d1e852fa
SHA16d01feaf4f257d1d6d17a5f8e929d8da8c55d00d
SHA2561e7ee51ec163a02e000b3d7848bf1da6abcf276dc4efc996b6e577512ce55f55
SHA512d66d388d606631322da46fd4e74cb262b00fad72fee5167971f862e7d228c9f3c7061b399eeb2ba09a2e4f667cf91f7695eb0169c76e589d520975cbf54b72b9
-
Filesize
1.2MB
MD566559b84af3fd055d79f9bd2d1e852fa
SHA16d01feaf4f257d1d6d17a5f8e929d8da8c55d00d
SHA2561e7ee51ec163a02e000b3d7848bf1da6abcf276dc4efc996b6e577512ce55f55
SHA512d66d388d606631322da46fd4e74cb262b00fad72fee5167971f862e7d228c9f3c7061b399eeb2ba09a2e4f667cf91f7695eb0169c76e589d520975cbf54b72b9
-
Filesize
1.2MB
MD566559b84af3fd055d79f9bd2d1e852fa
SHA16d01feaf4f257d1d6d17a5f8e929d8da8c55d00d
SHA2561e7ee51ec163a02e000b3d7848bf1da6abcf276dc4efc996b6e577512ce55f55
SHA512d66d388d606631322da46fd4e74cb262b00fad72fee5167971f862e7d228c9f3c7061b399eeb2ba09a2e4f667cf91f7695eb0169c76e589d520975cbf54b72b9