Analysis
-
max time kernel
127s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/03/2023, 01:14
Static task
static1
Behavioral task
behavioral1
Sample
dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe
Resource
win10v2004-20230220-en
General
-
Target
dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe
-
Size
1.6MB
-
MD5
58c300f1ab38828caa63a91429afdbf5
-
SHA1
8150d02d5ad8470e3b1a010135b3f14efc252e21
-
SHA256
dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b
-
SHA512
45854dfd048414810e77b12e9236885b224b3960a0b2375aafccfbf25d863057b1f7018478b2885a47198596d59d541e1b42beeab9f122b592668e94d2a485cd
-
SSDEEP
49152:OCWhF7BfJXAEskFBd8lJ8gNNV085zx+s7T6j79Q:OCWhF7BfKE/jqJ8KA85zx+sf6jxQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe -
Loads dropped DLL 2 IoCs
pid Process 4212 rundll32.exe 5020 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4548 wrote to memory of 2896 4548 dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe 87 PID 4548 wrote to memory of 2896 4548 dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe 87 PID 4548 wrote to memory of 2896 4548 dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe 87 PID 2896 wrote to memory of 4212 2896 control.exe 88 PID 2896 wrote to memory of 4212 2896 control.exe 88 PID 2896 wrote to memory of 4212 2896 control.exe 88 PID 4212 wrote to memory of 3700 4212 rundll32.exe 93 PID 4212 wrote to memory of 3700 4212 rundll32.exe 93 PID 3700 wrote to memory of 5020 3700 RunDll32.exe 94 PID 3700 wrote to memory of 5020 3700 RunDll32.exe 94 PID 3700 wrote to memory of 5020 3700 RunDll32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe"C:\Users\Admin\AppData\Local\Temp\dc828e4a8e7ecfa6581ae1fbadb716bff394615efa28a899e62fb2856c03fb7b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\PP899OF.C2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\PP899OF.C3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\PP899OF.C4⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\PP899OF.C5⤵
- Loads dropped DLL
PID:5020
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5052ce852f8bbc9c16ad83add6bb67b06
SHA1c6c264270df6b2b480d02f380a91531ef752a51f
SHA2566c5154eca9c3e8fd3a963a81c5437b4733179b590991bb5137a7e83200f4e061
SHA512f59449fdcc801500d512919d3dee7092aa146cf6b6a00cb804871d45868e43a48c79ecfc0650078f6127aee2a0687b34061a944e4c395f34400d46055d5af371
-
Filesize
1.0MB
MD5052ce852f8bbc9c16ad83add6bb67b06
SHA1c6c264270df6b2b480d02f380a91531ef752a51f
SHA2566c5154eca9c3e8fd3a963a81c5437b4733179b590991bb5137a7e83200f4e061
SHA512f59449fdcc801500d512919d3dee7092aa146cf6b6a00cb804871d45868e43a48c79ecfc0650078f6127aee2a0687b34061a944e4c395f34400d46055d5af371
-
Filesize
1.0MB
MD5052ce852f8bbc9c16ad83add6bb67b06
SHA1c6c264270df6b2b480d02f380a91531ef752a51f
SHA2566c5154eca9c3e8fd3a963a81c5437b4733179b590991bb5137a7e83200f4e061
SHA512f59449fdcc801500d512919d3dee7092aa146cf6b6a00cb804871d45868e43a48c79ecfc0650078f6127aee2a0687b34061a944e4c395f34400d46055d5af371