Analysis
-
max time kernel
109s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe
Resource
win10v2004-20230221-en
General
-
Target
3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe
-
Size
1.3MB
-
MD5
b00cdd5d39a71c7043305c268d3c1833
-
SHA1
202fb7dba112e1e78e89a8159db47176aa86042a
-
SHA256
3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a
-
SHA512
a615487793d67306a96b7a69f50e83eb2ce8d6d3ae17c5b7104eaa4ef3014ce6cd7900708483c809b10525d0c72ac499a42042f0fceaa6fa08fd01ff73e2f3c4
-
SSDEEP
24576:gJr8tE+gHqHAV4psT80BvX7FANJhrzX4NjMXEEjedB6zHkxjdW7bQkKq123X:gJ4Ng6+Ay7KJhINQzXQxjdWy22X
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation 3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe -
Loads dropped DLL 3 IoCs
pid Process 2560 rundll32.exe 2560 rundll32.exe 4444 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings 3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4464 wrote to memory of 3376 4464 3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe 86 PID 4464 wrote to memory of 3376 4464 3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe 86 PID 4464 wrote to memory of 3376 4464 3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe 86 PID 3376 wrote to memory of 2560 3376 control.exe 88 PID 3376 wrote to memory of 2560 3376 control.exe 88 PID 3376 wrote to memory of 2560 3376 control.exe 88 PID 2560 wrote to memory of 5100 2560 rundll32.exe 89 PID 2560 wrote to memory of 5100 2560 rundll32.exe 89 PID 5100 wrote to memory of 4444 5100 RunDll32.exe 90 PID 5100 wrote to memory of 4444 5100 RunDll32.exe 90 PID 5100 wrote to memory of 4444 5100 RunDll32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe"C:\Users\Admin\AppData\Local\Temp\3b436dd40ff12e6cfe5609a4062834ac9a44d07b84ca798190942058f5629e8a.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\iXZMRXe.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\iXZMRXe.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\iXZMRXe.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\iXZMRXe.cPl",5⤵
- Loads dropped DLL
PID:4444
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5904efa58a86b643db1f8e45cdee2e925
SHA1f56a0927622726f6575c4f01b89db4635ccde2fb
SHA2563839dbfec8c99734572156973b8f6518e159c9e3c9ea256181844b6997107700
SHA5124e4b472ec8a45a2faf032204c077fdab9992312155624e7c4171cadfe72637c825033d9a3d7acc343002c525ac66578f2e9bd8ed38ad039a2e4d6011aea200e9
-
Filesize
1.1MB
MD5904efa58a86b643db1f8e45cdee2e925
SHA1f56a0927622726f6575c4f01b89db4635ccde2fb
SHA2563839dbfec8c99734572156973b8f6518e159c9e3c9ea256181844b6997107700
SHA5124e4b472ec8a45a2faf032204c077fdab9992312155624e7c4171cadfe72637c825033d9a3d7acc343002c525ac66578f2e9bd8ed38ad039a2e4d6011aea200e9
-
Filesize
1.1MB
MD5904efa58a86b643db1f8e45cdee2e925
SHA1f56a0927622726f6575c4f01b89db4635ccde2fb
SHA2563839dbfec8c99734572156973b8f6518e159c9e3c9ea256181844b6997107700
SHA5124e4b472ec8a45a2faf032204c077fdab9992312155624e7c4171cadfe72637c825033d9a3d7acc343002c525ac66578f2e9bd8ed38ad039a2e4d6011aea200e9
-
Filesize
1.1MB
MD5904efa58a86b643db1f8e45cdee2e925
SHA1f56a0927622726f6575c4f01b89db4635ccde2fb
SHA2563839dbfec8c99734572156973b8f6518e159c9e3c9ea256181844b6997107700
SHA5124e4b472ec8a45a2faf032204c077fdab9992312155624e7c4171cadfe72637c825033d9a3d7acc343002c525ac66578f2e9bd8ed38ad039a2e4d6011aea200e9
-
Filesize
1.1MB
MD5904efa58a86b643db1f8e45cdee2e925
SHA1f56a0927622726f6575c4f01b89db4635ccde2fb
SHA2563839dbfec8c99734572156973b8f6518e159c9e3c9ea256181844b6997107700
SHA5124e4b472ec8a45a2faf032204c077fdab9992312155624e7c4171cadfe72637c825033d9a3d7acc343002c525ac66578f2e9bd8ed38ad039a2e4d6011aea200e9