Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 03:46
Static task
static1
Behavioral task
behavioral1
Sample
92fb4e56f561a72180c302bcd931e49af7395e3945f7f14d14b4e1d41e5dc442.exe
Resource
win10v2004-20230220-en
General
-
Target
92fb4e56f561a72180c302bcd931e49af7395e3945f7f14d14b4e1d41e5dc442.exe
-
Size
4.8MB
-
MD5
b945c78f3838cfb6c9ac404d68b153b7
-
SHA1
a0f5d36a31e2715737ca74c51848f30d831e96ee
-
SHA256
92fb4e56f561a72180c302bcd931e49af7395e3945f7f14d14b4e1d41e5dc442
-
SHA512
c4a980e3ab27671719e842261791139ad8409c7f376ecc747534888a4fd98b7a43b1426800a0f4d2479946fd5f72334a8debb1592fb812346e2198f3e8774802
-
SSDEEP
98304:aHlkanT+deP0BLPv0VttcfCo0AvYG5kpWP7TbIp1:yVT+BBLnSttcf0AvH5kEzA7
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 13 212 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 212 rundll32.exe 212 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 212 set thread context of 3868 212 rundll32.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3864 4024 WerFault.exe 85 -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3868 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4024 wrote to memory of 212 4024 92fb4e56f561a72180c302bcd931e49af7395e3945f7f14d14b4e1d41e5dc442.exe 86 PID 4024 wrote to memory of 212 4024 92fb4e56f561a72180c302bcd931e49af7395e3945f7f14d14b4e1d41e5dc442.exe 86 PID 4024 wrote to memory of 212 4024 92fb4e56f561a72180c302bcd931e49af7395e3945f7f14d14b4e1d41e5dc442.exe 86 PID 212 wrote to memory of 3868 212 rundll32.exe 95 PID 212 wrote to memory of 3868 212 rundll32.exe 95 PID 212 wrote to memory of 3868 212 rundll32.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\92fb4e56f561a72180c302bcd931e49af7395e3945f7f14d14b4e1d41e5dc442.exe"C:\Users\Admin\AppData\Local\Temp\92fb4e56f561a72180c302bcd931e49af7395e3945f7f14d14b4e1d41e5dc442.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Uieiuateoq.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 192073⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:3868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 4122⤵
- Program crash
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4024 -ip 40241⤵PID:232
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD54305a9c9f554b9d36605cc682a5d085f
SHA10fd982963faf166d37c318596bb64933c10bedc4
SHA256ede61fb4b35bfd235b09d5ada91a1b7fb96334e9c272d9d26ec9fb94b5e2c891
SHA5125d11110f9719939f86ec4775430448f29b2fae17b57848cebc6e136a6cc708c109a59069a88643c47f897f1eecdba0e65ce91f9c405e42089a7e5f09f02afd17
-
Filesize
5.4MB
MD54305a9c9f554b9d36605cc682a5d085f
SHA10fd982963faf166d37c318596bb64933c10bedc4
SHA256ede61fb4b35bfd235b09d5ada91a1b7fb96334e9c272d9d26ec9fb94b5e2c891
SHA5125d11110f9719939f86ec4775430448f29b2fae17b57848cebc6e136a6cc708c109a59069a88643c47f897f1eecdba0e65ce91f9c405e42089a7e5f09f02afd17
-
Filesize
5.4MB
MD54305a9c9f554b9d36605cc682a5d085f
SHA10fd982963faf166d37c318596bb64933c10bedc4
SHA256ede61fb4b35bfd235b09d5ada91a1b7fb96334e9c272d9d26ec9fb94b5e2c891
SHA5125d11110f9719939f86ec4775430448f29b2fae17b57848cebc6e136a6cc708c109a59069a88643c47f897f1eecdba0e65ce91f9c405e42089a7e5f09f02afd17