Analysis
-
max time kernel
144s -
max time network
183s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/06/2023, 02:53
Static task
static1
Behavioral task
behavioral1
Sample
bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe
Resource
win10-20230220-en
General
-
Target
bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe
-
Size
2.0MB
-
MD5
74785d4d9e9f5acde8351e76b9826f6c
-
SHA1
0478146969d0ba923c48d7739432e405c0eec92a
-
SHA256
bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4
-
SHA512
ef554b495e7b26286dd9a095cf068a76c0c5797954b036b2eefaf0aec9c5123c1d943c75ca09bb52dae5fa26d36b8cfd38a6d882021ffb79b5b295c2aa7dfa15
-
SSDEEP
49152:F0BfJXAEh4mpR+4mCyIfjhpWGGcz/l2m78ttosqaT91Tm9zZLktJlwOwxyxK:F0BfKEh/+QvFpLBDld8ttosqahBIQ7q1
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2900 rundll32.exe 4264 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-640001698-3754512395-3275565439-1000_Classes\Local Settings bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2332 2076 bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe 66 PID 2076 wrote to memory of 2332 2076 bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe 66 PID 2076 wrote to memory of 2332 2076 bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe 66 PID 2332 wrote to memory of 2900 2332 control.exe 68 PID 2332 wrote to memory of 2900 2332 control.exe 68 PID 2332 wrote to memory of 2900 2332 control.exe 68 PID 2900 wrote to memory of 4908 2900 rundll32.exe 69 PID 2900 wrote to memory of 4908 2900 rundll32.exe 69 PID 4908 wrote to memory of 4264 4908 RunDll32.exe 70 PID 4908 wrote to memory of 4264 4908 RunDll32.exe 70 PID 4908 wrote to memory of 4264 4908 RunDll32.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe"C:\Users\Admin\AppData\Local\Temp\bea445cd71f0615353625114161291b7b9cab80829b3670951252053c72e68d4.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\YZNQBQTr.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\YZNQBQTr.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\YZNQBQTr.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\YZNQBQTr.CpL",5⤵
- Loads dropped DLL
PID:4264
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5476b9f28e5946f52800f83b6ab2e0902
SHA1e683a0ed7f2e8ef2bd9785c23837fe26beac5a1b
SHA25655644975f3ce9a5dc69f33c062eb8aa0e5bca1603471cbcb68e6b2165e4c0a0b
SHA512f42c62cab19775d1718526dbd51152f66f14ceffed69d008155445ebcffd7df39f8f2a2c13eff5599e6e04bf7624b1b96c3badd04e3d5288456b142e49ce14b3
-
Filesize
1.5MB
MD5476b9f28e5946f52800f83b6ab2e0902
SHA1e683a0ed7f2e8ef2bd9785c23837fe26beac5a1b
SHA25655644975f3ce9a5dc69f33c062eb8aa0e5bca1603471cbcb68e6b2165e4c0a0b
SHA512f42c62cab19775d1718526dbd51152f66f14ceffed69d008155445ebcffd7df39f8f2a2c13eff5599e6e04bf7624b1b96c3badd04e3d5288456b142e49ce14b3
-
Filesize
1.5MB
MD5476b9f28e5946f52800f83b6ab2e0902
SHA1e683a0ed7f2e8ef2bd9785c23837fe26beac5a1b
SHA25655644975f3ce9a5dc69f33c062eb8aa0e5bca1603471cbcb68e6b2165e4c0a0b
SHA512f42c62cab19775d1718526dbd51152f66f14ceffed69d008155445ebcffd7df39f8f2a2c13eff5599e6e04bf7624b1b96c3badd04e3d5288456b142e49ce14b3