Analysis
-
max time kernel
53s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
03/03/2023, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf.exe
Resource
win10-20230220-en
General
-
Target
3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf.exe
-
Size
1.8MB
-
MD5
79d124b506eda56545d1b7dc4e3e602c
-
SHA1
9c6ceb3600430b355ee197e28853802ff191b3d0
-
SHA256
3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf
-
SHA512
eb89d20df02bf17b2a20d3dfefba32dd0f6c53e010b5a9f6ec39708ad65e842fb02e2b04fc4ff271d4763d9ac31cedda97038b45bed0fe44a670f7b7079bfdcb
-
SSDEEP
49152:beWh6RBfJXAE6Ujuk5jkrYDwd2hCvdXi7sBjMSYXLYiN:beWh6RBfKEhBDNAkghMSYXLxN
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4232 rundll32.exe 3956 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3853465373-1718857667-1861325682-1000_Classes\Local Settings 3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4148 wrote to memory of 4420 4148 3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf.exe 66 PID 4148 wrote to memory of 4420 4148 3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf.exe 66 PID 4148 wrote to memory of 4420 4148 3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf.exe 66 PID 4420 wrote to memory of 4232 4420 control.exe 68 PID 4420 wrote to memory of 4232 4420 control.exe 68 PID 4420 wrote to memory of 4232 4420 control.exe 68 PID 4232 wrote to memory of 1780 4232 rundll32.exe 69 PID 4232 wrote to memory of 1780 4232 rundll32.exe 69 PID 1780 wrote to memory of 3956 1780 RunDll32.exe 70 PID 1780 wrote to memory of 3956 1780 RunDll32.exe 70 PID 1780 wrote to memory of 3956 1780 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf.exe"C:\Users\Admin\AppData\Local\Temp\3a2defbcce76680fa2f029e40cf99a8078c8cf6d4f26c886d1cf48f3ebbd54bf.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\LS59JPK.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\LS59JPK.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\LS59JPK.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\LS59JPK.CPl",5⤵
- Loads dropped DLL
PID:3956
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ddd6dd2e8ca395389dd966c67bafd2d1
SHA164c16de3a087eaab66b5d21d7958c054c4e22f90
SHA25654e9cbdfb3b8fc52f5eccdc75d4b576f2811ed1682ccb66ec99f0ad6dbd62726
SHA512125492fde6967307eaf8643b490666583e4eac8e66e640afef82ee48e227d5fa2174aa1d15333bc27d733ad3dbef8e586896591bed19526cdf1d4f52f764620a
-
Filesize
1.2MB
MD5ddd6dd2e8ca395389dd966c67bafd2d1
SHA164c16de3a087eaab66b5d21d7958c054c4e22f90
SHA25654e9cbdfb3b8fc52f5eccdc75d4b576f2811ed1682ccb66ec99f0ad6dbd62726
SHA512125492fde6967307eaf8643b490666583e4eac8e66e640afef82ee48e227d5fa2174aa1d15333bc27d733ad3dbef8e586896591bed19526cdf1d4f52f764620a
-
Filesize
1.2MB
MD5ddd6dd2e8ca395389dd966c67bafd2d1
SHA164c16de3a087eaab66b5d21d7958c054c4e22f90
SHA25654e9cbdfb3b8fc52f5eccdc75d4b576f2811ed1682ccb66ec99f0ad6dbd62726
SHA512125492fde6967307eaf8643b490666583e4eac8e66e640afef82ee48e227d5fa2174aa1d15333bc27d733ad3dbef8e586896591bed19526cdf1d4f52f764620a