Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 23:16
Static task
static1
Behavioral task
behavioral1
Sample
4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16.exe
Resource
win10v2004-20230220-en
General
-
Target
4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16.exe
-
Size
1.6MB
-
MD5
9e06a0786468ed24345a62da7b900151
-
SHA1
d750896c4d733e08826e40a98caed1069c119d61
-
SHA256
4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16
-
SHA512
443cdd55bc6b0c169c1862eacdd0fa1fd44bbc2dfa5357a8a626b61187ab53bc372e22e154e16bae8f61eaee42efdbca1fa210b5e474f6043360d1f3dcbe34ee
-
SSDEEP
49152:oeZB+BfJXAEKvukFsT5/NYzLoHP8ZrOO2FKMZJAm2F:oeZB+BfKEKFsT5az8Hyz2YM2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16.exe -
Loads dropped DLL 3 IoCs
pid Process 584 rundll32.exe 584 rundll32.exe 2248 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1332 wrote to memory of 2880 1332 4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16.exe 85 PID 1332 wrote to memory of 2880 1332 4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16.exe 85 PID 1332 wrote to memory of 2880 1332 4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16.exe 85 PID 2880 wrote to memory of 584 2880 control.exe 86 PID 2880 wrote to memory of 584 2880 control.exe 86 PID 2880 wrote to memory of 584 2880 control.exe 86 PID 584 wrote to memory of 2440 584 rundll32.exe 93 PID 584 wrote to memory of 2440 584 rundll32.exe 93 PID 2440 wrote to memory of 2248 2440 RunDll32.exe 94 PID 2440 wrote to memory of 2248 2440 RunDll32.exe 94 PID 2440 wrote to memory of 2248 2440 RunDll32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16.exe"C:\Users\Admin\AppData\Local\Temp\4b73d0d14bc8754a2bfe8718e1d3d9d7b5d902f9b8d6336a33c7164992b81e16.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\OKqlBO1X.4T2⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\OKqlBO1X.4T3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\OKqlBO1X.4T4⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\OKqlBO1X.4T5⤵
- Loads dropped DLL
PID:2248
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52ed87c60aa7478ff588ca98aa4f0f26d
SHA17b2569fd1fceafa5d328f9ecb0e0a25c937ef949
SHA256f16d0f341f32f8a1549d164ea3f6bab0a8479364bfbb7ca3918ee0d3874bc67f
SHA512e645d90d37987f313e41dadd18a0c14c63a9f41ec70e48cbe6acaa8f1455aee685bb63ce48c368c70ec24ec052943bbe25ea3adec436b427c0020ec7d9d81df5
-
Filesize
1.1MB
MD52ed87c60aa7478ff588ca98aa4f0f26d
SHA17b2569fd1fceafa5d328f9ecb0e0a25c937ef949
SHA256f16d0f341f32f8a1549d164ea3f6bab0a8479364bfbb7ca3918ee0d3874bc67f
SHA512e645d90d37987f313e41dadd18a0c14c63a9f41ec70e48cbe6acaa8f1455aee685bb63ce48c368c70ec24ec052943bbe25ea3adec436b427c0020ec7d9d81df5
-
Filesize
1.1MB
MD52ed87c60aa7478ff588ca98aa4f0f26d
SHA17b2569fd1fceafa5d328f9ecb0e0a25c937ef949
SHA256f16d0f341f32f8a1549d164ea3f6bab0a8479364bfbb7ca3918ee0d3874bc67f
SHA512e645d90d37987f313e41dadd18a0c14c63a9f41ec70e48cbe6acaa8f1455aee685bb63ce48c368c70ec24ec052943bbe25ea3adec436b427c0020ec7d9d81df5
-
Filesize
1.1MB
MD52ed87c60aa7478ff588ca98aa4f0f26d
SHA17b2569fd1fceafa5d328f9ecb0e0a25c937ef949
SHA256f16d0f341f32f8a1549d164ea3f6bab0a8479364bfbb7ca3918ee0d3874bc67f
SHA512e645d90d37987f313e41dadd18a0c14c63a9f41ec70e48cbe6acaa8f1455aee685bb63ce48c368c70ec24ec052943bbe25ea3adec436b427c0020ec7d9d81df5