Analysis

  • max time kernel
    91s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 07:14

General

  • Target

    0d5fbb4d6e1ca72c237f7b24d296e46c15fc974802cf324bcac918e0959b66e3.exe

  • Size

    1.3MB

  • MD5

    45b0836ce023bb4cfc9b5710718b3d5d

  • SHA1

    d817fb6ca95ded6ae06e4e0f1a115c989b8c3b82

  • SHA256

    0d5fbb4d6e1ca72c237f7b24d296e46c15fc974802cf324bcac918e0959b66e3

  • SHA512

    3d9a95992a0166bf496a30bd14ee232610a1ea0d94dfc92084d96048930505224bb0d2bfd386f77a4c187f4308976499fc35432d989d5fae13bfa17e5bd89296

  • SSDEEP

    24576:gJr8tE+gHqok+3cSI+xALeihdY83jyjLS5/RlGCFzG2ZFKji3MK:gJ4NokDSXxALeih73jqLg5Mu9FWi8K

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0d5fbb4d6e1ca72c237f7b24d296e46c15fc974802cf324bcac918e0959b66e3.exe
    "C:\Users\Admin\AppData\Local\Temp\0d5fbb4d6e1ca72c237f7b24d296e46c15fc974802cf324bcac918e0959b66e3.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\HaA2L.cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HaA2L.cpl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HaA2L.cpl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:668
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\HaA2L.cpl",
            5⤵
            • Loads dropped DLL
            PID:2188

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\HaA2L.cpl

          Filesize

          1.1MB

          MD5

          8e2d9feb1ba119a73dff7881bc9e7e4b

          SHA1

          25ef51587f25d671b9f01c42d325411c6bd5fd1c

          SHA256

          9a92eb8ace4bf4c2d759b2b9458ad58791384e71cb5015919b4deee6fa60fefe

          SHA512

          0605ef1bd1babb32b227febee86252c126940d4bda2b73b2031ba344d2d2ee1a8c74f81a12e359dbaee7dbf4890d659a575c54bc38f364477bd11e38143b5b0e

        • C:\Users\Admin\AppData\Local\Temp\Haa2L.cpl

          Filesize

          1.1MB

          MD5

          8e2d9feb1ba119a73dff7881bc9e7e4b

          SHA1

          25ef51587f25d671b9f01c42d325411c6bd5fd1c

          SHA256

          9a92eb8ace4bf4c2d759b2b9458ad58791384e71cb5015919b4deee6fa60fefe

          SHA512

          0605ef1bd1babb32b227febee86252c126940d4bda2b73b2031ba344d2d2ee1a8c74f81a12e359dbaee7dbf4890d659a575c54bc38f364477bd11e38143b5b0e

        • C:\Users\Admin\AppData\Local\Temp\Haa2L.cpl

          Filesize

          1.1MB

          MD5

          8e2d9feb1ba119a73dff7881bc9e7e4b

          SHA1

          25ef51587f25d671b9f01c42d325411c6bd5fd1c

          SHA256

          9a92eb8ace4bf4c2d759b2b9458ad58791384e71cb5015919b4deee6fa60fefe

          SHA512

          0605ef1bd1babb32b227febee86252c126940d4bda2b73b2031ba344d2d2ee1a8c74f81a12e359dbaee7dbf4890d659a575c54bc38f364477bd11e38143b5b0e

        • C:\Users\Admin\AppData\Local\Temp\Haa2L.cpl

          Filesize

          1.1MB

          MD5

          8e2d9feb1ba119a73dff7881bc9e7e4b

          SHA1

          25ef51587f25d671b9f01c42d325411c6bd5fd1c

          SHA256

          9a92eb8ace4bf4c2d759b2b9458ad58791384e71cb5015919b4deee6fa60fefe

          SHA512

          0605ef1bd1babb32b227febee86252c126940d4bda2b73b2031ba344d2d2ee1a8c74f81a12e359dbaee7dbf4890d659a575c54bc38f364477bd11e38143b5b0e

        • memory/1384-152-0x0000000002F70000-0x000000000303D000-memory.dmp

          Filesize

          820KB

        • memory/1384-147-0x0000000002E80000-0x0000000002F62000-memory.dmp

          Filesize

          904KB

        • memory/1384-148-0x0000000000400000-0x000000000050F000-memory.dmp

          Filesize

          1.1MB

        • memory/1384-149-0x0000000002F70000-0x000000000303D000-memory.dmp

          Filesize

          820KB

        • memory/1384-146-0x0000000002D50000-0x0000000002D56000-memory.dmp

          Filesize

          24KB

        • memory/1384-153-0x0000000002F70000-0x000000000303D000-memory.dmp

          Filesize

          820KB

        • memory/1384-144-0x0000000000400000-0x000000000050F000-memory.dmp

          Filesize

          1.1MB

        • memory/2188-157-0x0000000002A40000-0x0000000002A46000-memory.dmp

          Filesize

          24KB

        • memory/2188-159-0x00000000030D0000-0x00000000031B2000-memory.dmp

          Filesize

          904KB

        • memory/2188-160-0x00000000031C0000-0x000000000328D000-memory.dmp

          Filesize

          820KB

        • memory/2188-163-0x00000000031C0000-0x000000000328D000-memory.dmp

          Filesize

          820KB

        • memory/2188-164-0x00000000031C0000-0x000000000328D000-memory.dmp

          Filesize

          820KB