Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
data64_6.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
data64_6.exe
Resource
win10v2004-20230621-en
General
-
Target
data64_6.exe
-
Size
1.9MB
-
MD5
182baf929b35d5d63747617d2007c77a
-
SHA1
0dfe91ab115ed862b48b1e4006a44e86c33eb772
-
SHA256
582150ba4379122253eeb2a1a7ace968394ee7e566f0d0d794f6ba7d937037d5
-
SHA512
55bab5bbec04389f94f297843f7fcb4d71173c8f1f6e5007b6a2eaf5d937f50f9b2d9f61f983c86b20d342a4a4cb6691e23c3a0322575c826d23b55ee61a19f7
-
SSDEEP
49152:084cMQyRcf9HmjMbS4b08WrjXM6pzM6MGaU9PPIbnllyuA:6cMQyW9GX4MXBGyZPynXyB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177513644-1903222820-241662473-1000\Control Panel\International\Geo\Nation data64_6.exe -
Loads dropped DLL 4 IoCs
pid Process 3620 rundll32.exe 3620 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2177513644-1903222820-241662473-1000_Classes\Local Settings data64_6.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1788 wrote to memory of 3368 1788 data64_6.exe 86 PID 1788 wrote to memory of 3368 1788 data64_6.exe 86 PID 1788 wrote to memory of 3368 1788 data64_6.exe 86 PID 3368 wrote to memory of 3620 3368 control.exe 88 PID 3368 wrote to memory of 3620 3368 control.exe 88 PID 3368 wrote to memory of 3620 3368 control.exe 88 PID 3620 wrote to memory of 2248 3620 rundll32.exe 97 PID 3620 wrote to memory of 2248 3620 rundll32.exe 97 PID 2248 wrote to memory of 1088 2248 RunDll32.exe 98 PID 2248 wrote to memory of 1088 2248 RunDll32.exe 98 PID 2248 wrote to memory of 1088 2248 RunDll32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\data64_6.exe"C:\Users\Admin\AppData\Local\Temp\data64_6.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",5⤵
- Loads dropped DLL
PID:1088
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad