Analysis
-
max time kernel
77s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2023 03:14
Static task
static1
Behavioral task
behavioral1
Sample
121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe
Resource
win10v2004-20230221-en
General
-
Target
121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe
-
Size
1.5MB
-
MD5
1dc810576ed60cec89abdf73a85c8486
-
SHA1
eaf4c4a71961fbdc1ffeff7945b5ec18b17fe28d
-
SHA256
121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0
-
SHA512
ffa924807d55c5a9cb7277d8ecdc164dda56bfba8d807ef3d4b52053e10d22c71207c5d5071310033743627d937e10a1a95db40ced57af7cc79e705ab0ed1e56
-
SSDEEP
24576:2TbBv5rUyXVLF9/sv0CHYMOc65PEHspw2+3Wqtxm+5wiYq3ZBlGiIlwpiJuqGRqd:IBJx9/7sU8mwZ3xm+WGnGiIupSfGsr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe -
Loads dropped DLL 3 IoCs
pid Process 404 rundll32.exe 1116 rundll32.exe 1116 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings 121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 624 wrote to memory of 5088 624 121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe 85 PID 624 wrote to memory of 5088 624 121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe 85 PID 624 wrote to memory of 5088 624 121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe 85 PID 5088 wrote to memory of 404 5088 control.exe 87 PID 5088 wrote to memory of 404 5088 control.exe 87 PID 5088 wrote to memory of 404 5088 control.exe 87 PID 404 wrote to memory of 4388 404 rundll32.exe 92 PID 404 wrote to memory of 4388 404 rundll32.exe 92 PID 4388 wrote to memory of 1116 4388 RunDll32.exe 93 PID 4388 wrote to memory of 1116 4388 RunDll32.exe 93 PID 4388 wrote to memory of 1116 4388 RunDll32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe"C:\Users\Admin\AppData\Local\Temp\121158240e1f878a365cc7bc6c519f32b9b82d813d648c7f2cf51fe474ea28e0.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\P_RC.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\P_RC.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\P_RC.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\P_RC.cPL",5⤵
- Loads dropped DLL
PID:1116
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54e819c60ef1394b143b02c438d69b322
SHA11046f082bb243a42f5e45833c33b12fe1473949c
SHA256e1e25124e6f08b89ef3d52ae588e7c51af1e0b1618cb36567f1d5cee271c182d
SHA512a4b81b45865a45778090bb8a7ea95e7ddf0abd9aa9235bbcb638c60e0157edf6125c4f6aee8ceae3b85ac490ac053a0486b1f468985974570d1df44537b7fc66
-
Filesize
1.2MB
MD54e819c60ef1394b143b02c438d69b322
SHA11046f082bb243a42f5e45833c33b12fe1473949c
SHA256e1e25124e6f08b89ef3d52ae588e7c51af1e0b1618cb36567f1d5cee271c182d
SHA512a4b81b45865a45778090bb8a7ea95e7ddf0abd9aa9235bbcb638c60e0157edf6125c4f6aee8ceae3b85ac490ac053a0486b1f468985974570d1df44537b7fc66
-
Filesize
1.2MB
MD54e819c60ef1394b143b02c438d69b322
SHA11046f082bb243a42f5e45833c33b12fe1473949c
SHA256e1e25124e6f08b89ef3d52ae588e7c51af1e0b1618cb36567f1d5cee271c182d
SHA512a4b81b45865a45778090bb8a7ea95e7ddf0abd9aa9235bbcb638c60e0157edf6125c4f6aee8ceae3b85ac490ac053a0486b1f468985974570d1df44537b7fc66
-
Filesize
1.2MB
MD54e819c60ef1394b143b02c438d69b322
SHA11046f082bb243a42f5e45833c33b12fe1473949c
SHA256e1e25124e6f08b89ef3d52ae588e7c51af1e0b1618cb36567f1d5cee271c182d
SHA512a4b81b45865a45778090bb8a7ea95e7ddf0abd9aa9235bbcb638c60e0157edf6125c4f6aee8ceae3b85ac490ac053a0486b1f468985974570d1df44537b7fc66
-
Filesize
1.2MB
MD54e819c60ef1394b143b02c438d69b322
SHA11046f082bb243a42f5e45833c33b12fe1473949c
SHA256e1e25124e6f08b89ef3d52ae588e7c51af1e0b1618cb36567f1d5cee271c182d
SHA512a4b81b45865a45778090bb8a7ea95e7ddf0abd9aa9235bbcb638c60e0157edf6125c4f6aee8ceae3b85ac490ac053a0486b1f468985974570d1df44537b7fc66