Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2023, 17:11
Static task
static1
Behavioral task
behavioral1
Sample
c535c0448c348958d31b41a49451fe0d15dd3def4ad929ff6a46c8346b2f4c73.exe
Resource
win10v2004-20230220-en
General
-
Target
c535c0448c348958d31b41a49451fe0d15dd3def4ad929ff6a46c8346b2f4c73.exe
-
Size
4.7MB
-
MD5
ddb4dfde76b491d603e003da4d78d994
-
SHA1
f1a1bf91006dec4e990a6c8ca11a6376a4fad8d0
-
SHA256
c535c0448c348958d31b41a49451fe0d15dd3def4ad929ff6a46c8346b2f4c73
-
SHA512
ac81fdbf897145b79db94a6547435ab715dce5742eef92b87431f14bede574eaf439b3a256ca8ff5a08e0ecba4e8a5341d6efd287a31cb71efb782e0b8e4737a
-
SSDEEP
98304:ATFV+rR0sKsx9o9VprGGGhCLfsFw8E+0kgJJZMESxUtBt:ATwSs7vo9i3hCQ4dJJZM7xUtn
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 9 1148 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1148 rundll32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1148 set thread context of 4196 1148 rundll32.exe 86 PID 1148 set thread context of 4452 1148 rundll32.exe 88 PID 1148 set thread context of 4436 1148 rundll32.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 4112 3888 WerFault.exe 79 -
Checks processor information in registry 2 TTPs 26 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe -
Modifies registry class 23 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4196 rundll32.exe 4452 rundll32.exe 4436 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3888 wrote to memory of 1148 3888 c535c0448c348958d31b41a49451fe0d15dd3def4ad929ff6a46c8346b2f4c73.exe 80 PID 3888 wrote to memory of 1148 3888 c535c0448c348958d31b41a49451fe0d15dd3def4ad929ff6a46c8346b2f4c73.exe 80 PID 3888 wrote to memory of 1148 3888 c535c0448c348958d31b41a49451fe0d15dd3def4ad929ff6a46c8346b2f4c73.exe 80 PID 1148 wrote to memory of 4196 1148 rundll32.exe 86 PID 1148 wrote to memory of 4196 1148 rundll32.exe 86 PID 1148 wrote to memory of 4196 1148 rundll32.exe 86 PID 1148 wrote to memory of 4452 1148 rundll32.exe 88 PID 1148 wrote to memory of 4452 1148 rundll32.exe 88 PID 1148 wrote to memory of 4452 1148 rundll32.exe 88 PID 1148 wrote to memory of 4436 1148 rundll32.exe 89 PID 1148 wrote to memory of 4436 1148 rundll32.exe 89 PID 1148 wrote to memory of 4436 1148 rundll32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c535c0448c348958d31b41a49451fe0d15dd3def4ad929ff6a46c8346b2f4c73.exe"C:\Users\Admin\AppData\Local\Temp\c535c0448c348958d31b41a49451fe0d15dd3def4ad929ff6a46c8346b2f4c73.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Uieiuateoq.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 191983⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4196
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 191983⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4452
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 191983⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:4436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 4122⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3888 -ip 38881⤵PID:3924
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.4MB
MD509b7fe4b55f6016ce3eb1271bd173123
SHA16199c259178e87c76a770d87b49aff15c2608acd
SHA2568c6f657165beecf4068823ccb5656d1c2d1ab3eacc6884e7ac69ccc82574033f
SHA512a1d0bc6ab41cea05220bfcc71cc782ea4c9bf1b038c3463b733e38ce70d752cde261cf047c15dacb7f6ba9c5909027857d411cb276620ca951ae6afc193eb754
-
Filesize
5.4MB
MD509b7fe4b55f6016ce3eb1271bd173123
SHA16199c259178e87c76a770d87b49aff15c2608acd
SHA2568c6f657165beecf4068823ccb5656d1c2d1ab3eacc6884e7ac69ccc82574033f
SHA512a1d0bc6ab41cea05220bfcc71cc782ea4c9bf1b038c3463b733e38ce70d752cde261cf047c15dacb7f6ba9c5909027857d411cb276620ca951ae6afc193eb754