Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2023, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f.exe
Resource
win10-20230220-en
General
-
Target
48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f.exe
-
Size
1.5MB
-
MD5
67a08d419cfe9fb6dde560b64eb70e10
-
SHA1
b9062ff2cd2a5e115c498620d2d114893fb8f497
-
SHA256
48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f
-
SHA512
a0ce3602a34472207ac020db72cc60a2c9df7c678e15b01c1230b25ff4439c250fbe0b4e5645746a58c97b477ed7167532039213e062375a8a465828c815bf37
-
SSDEEP
24576:elMiZMVn1db5AnUZLPLs2RPljK/X6lhfO/Ag5MKxpl38lo2k5mZpYQ+MedyFQh:5FPLs2RPxwX6lhOzZf392k5mHVA
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2632 rundll32.exe 4628 rundll32.exe 4628 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings 48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2896 wrote to memory of 4184 2896 48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f.exe 66 PID 2896 wrote to memory of 4184 2896 48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f.exe 66 PID 2896 wrote to memory of 4184 2896 48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f.exe 66 PID 4184 wrote to memory of 2632 4184 control.exe 68 PID 4184 wrote to memory of 2632 4184 control.exe 68 PID 4184 wrote to memory of 2632 4184 control.exe 68 PID 2632 wrote to memory of 4008 2632 rundll32.exe 69 PID 2632 wrote to memory of 4008 2632 rundll32.exe 69 PID 4008 wrote to memory of 4628 4008 RunDll32.exe 70 PID 4008 wrote to memory of 4628 4008 RunDll32.exe 70 PID 4008 wrote to memory of 4628 4008 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f.exe"C:\Users\Admin\AppData\Local\Temp\48384b146626c1bd60bc7b88d5dfadcc59f3aed2f2042f7e455d7bde850a3f1f.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\09hLG.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\09hLG.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\09hLG.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\09hLG.CpL",5⤵
- Loads dropped DLL
PID:4628
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD56c3695a41502284045c1ae3d727b6cd2
SHA1ce12fe94d796dbaf704eeaf80d078bf301a32c4a
SHA256d4acd7e7f39076e1f5edc7e01a8b36d87a92a006ce28c5573372731ade467525
SHA512e7aefa3bca97ee508e868df99d311c0a2408d412e9788f3edd3a4037134260b81fe1ba0354af8f50a5af9e939f0efb52c09ec8d72f399078a15d4e8dbe72b56b
-
Filesize
1.1MB
MD56c3695a41502284045c1ae3d727b6cd2
SHA1ce12fe94d796dbaf704eeaf80d078bf301a32c4a
SHA256d4acd7e7f39076e1f5edc7e01a8b36d87a92a006ce28c5573372731ade467525
SHA512e7aefa3bca97ee508e868df99d311c0a2408d412e9788f3edd3a4037134260b81fe1ba0354af8f50a5af9e939f0efb52c09ec8d72f399078a15d4e8dbe72b56b
-
Filesize
1.1MB
MD56c3695a41502284045c1ae3d727b6cd2
SHA1ce12fe94d796dbaf704eeaf80d078bf301a32c4a
SHA256d4acd7e7f39076e1f5edc7e01a8b36d87a92a006ce28c5573372731ade467525
SHA512e7aefa3bca97ee508e868df99d311c0a2408d412e9788f3edd3a4037134260b81fe1ba0354af8f50a5af9e939f0efb52c09ec8d72f399078a15d4e8dbe72b56b
-
Filesize
1.1MB
MD56c3695a41502284045c1ae3d727b6cd2
SHA1ce12fe94d796dbaf704eeaf80d078bf301a32c4a
SHA256d4acd7e7f39076e1f5edc7e01a8b36d87a92a006ce28c5573372731ade467525
SHA512e7aefa3bca97ee508e868df99d311c0a2408d412e9788f3edd3a4037134260b81fe1ba0354af8f50a5af9e939f0efb52c09ec8d72f399078a15d4e8dbe72b56b