Overview
overview
10Static
static
1007117c02a0...99.dll
windows7-x64
107117c02a0...99.dll
windows10-2004-x64
11391c20a26...80.dll
windows7-x64
101391c20a26...80.dll
windows10-2004-x64
10350ba7fca6...bd.exe
windows7-x64
9350ba7fca6...bd.exe
windows10-2004-x64
1051eb749d6c...3e.dll
windows7-x64
351eb749d6c...3e.dll
windows10-2004-x64
1017205c4318...90.exe
windows7-x64
917205c4318...90.exe
windows10-2004-x64
95d2204f3a2...aa.exe
windows7-x64
5d2204f3a2...aa.exe
windows10-2004-x64
7883f01096...8a.exe
windows7-x64
107883f01096...8a.exe
windows10-2004-x64
10ae7c868713...6e.exe
windows7-x64
10ae7c868713...6e.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 12:59
Behavioral task
behavioral1
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1391c20a26f248f7c602f20096bf1886cfe7e4d151602a1258a9bbe7c02c1c80.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
350ba7fca67721c74385faff083914ecdd66ef107a765dfb7ac08b38d5c9c0bd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
51eb749d6cbd08baf9d43c2f83abd9d4d86eb5206f62ba43b768251a98ce9d3e.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
17205c43189c22dfcb278f5cc45c2562f622b0b6280dcd43cc1d3c274095eb90.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
5d2204f3a20e163120f52a2e3595db19890050b2faa96c6cba6b094b0a52b0aa.exe
Resource
win10v2004-20240319-en
Behavioral task
behavioral13
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
7883f01096db9bcf090c2317749b6873036c27ba92451b212b8645770e1f0b8a.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
ae7c868713e1d02b4db60128c651eb1e3f6a33c02544cc4cb57c3aa6c6581b6e.exe
Resource
win10v2004-20240226-en
General
-
Target
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll
-
Size
838KB
-
MD5
afa27795c0c86b6afeb138d0fb09506b
-
SHA1
d32e44f7e04a8c84e7159ed020dcf26b6e51416e
-
SHA256
07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799
-
SHA512
85e92d60000981d836c8fe102a191e21c94f6add14fef0dd33816060699dfa5a05e1db38bd8b7194ad9e1ff30240bfdf807f91d0abe535733e2a2fc1d7264fc0
-
SSDEEP
24576:pyAo7FAIP03acBtXWKe25ep59MxQU08wHG3MJAQof1hB:Lo7ARBtmKe28MSU08wHaM6Qo1hB
Malware Config
Signatures
-
Modifies registry class 3 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.agnkdbd5y\DefaultIcon rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.agnkdbd5y rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.agnkdbd5y\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\fkdjsadasd.ico" rundll32.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 4848 notepad.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
rundll32.exerundll32.execmd.exedescription pid process target process PID 1096 wrote to memory of 4792 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 4792 1096 rundll32.exe rundll32.exe PID 1096 wrote to memory of 4792 1096 rundll32.exe rundll32.exe PID 4792 wrote to memory of 2088 4792 rundll32.exe cmd.exe PID 4792 wrote to memory of 2088 4792 rundll32.exe cmd.exe PID 4792 wrote to memory of 2088 4792 rundll32.exe cmd.exe PID 2088 wrote to memory of 4848 2088 cmd.exe notepad.exe PID 2088 wrote to memory of 4848 2088 cmd.exe notepad.exe PID 2088 wrote to memory of 4848 2088 cmd.exe notepad.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\07117c02a09410f47a326b52c7f17407e63ba5e6ff97277446efc75b862d2799.dll,#12⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start /MAX notepad.exe c:\instructions_read_me.txt3⤵
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\notepad.exenotepad.exe c:\instructions_read_me.txt4⤵
- Opens file in notepad (likely ransom note)
PID:4848
-
-
-