Analysis
-
max time kernel
141s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 13:39
Static task
static1
Behavioral task
behavioral1
Sample
d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe
Resource
win10v2004-20230703-en
General
-
Target
d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe
-
Size
1.7MB
-
MD5
0d5c92dfc31c339132277e964f82f1bf
-
SHA1
681485d93709a698b28431cff17c3df7e50bf42d
-
SHA256
d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f
-
SHA512
a9801b621ca9cdffa01aab71d4f1793221f5a84a69051536a54d3460d0ffd01e4735b1a0e5636ef52719e34dc28d120987d154143cf37229d7e5546eaeae1b4b
-
SSDEEP
49152:OCWhF7BfJXAEsXH9bEJTOBwnnlbKHE9tH6Yh9G3QQq5O:OCWhF7BfKECEJThnlbOEvH689rN5O
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe -
Loads dropped DLL 2 IoCs
pid Process 1868 rundll32.exe 2084 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000_Classes\Local Settings d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2508 4408 d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe 86 PID 4408 wrote to memory of 2508 4408 d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe 86 PID 4408 wrote to memory of 2508 4408 d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe 86 PID 2508 wrote to memory of 1868 2508 control.exe 88 PID 2508 wrote to memory of 1868 2508 control.exe 88 PID 2508 wrote to memory of 1868 2508 control.exe 88 PID 1868 wrote to memory of 2848 1868 rundll32.exe 93 PID 1868 wrote to memory of 2848 1868 rundll32.exe 93 PID 2848 wrote to memory of 2084 2848 RunDll32.exe 94 PID 2848 wrote to memory of 2084 2848 RunDll32.exe 94 PID 2848 wrote to memory of 2084 2848 RunDll32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe"C:\Users\Admin\AppData\Local\Temp\d02ca6cc79e5b759daa5412b01f98590edaf9a002a46002c71019d6fcc032e9f.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\~URV.cPL",2⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\~URV.cPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\~URV.cPL",4⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\~URV.cPL",5⤵
- Loads dropped DLL
PID:2084
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD518aff3e4889a949829bc9db91bac2d79
SHA1b3c1b0d0057828348cea1cb8e3ed88d347fdf6c8
SHA256bc6c612c9ca5e9e50c9ef1474ee587b93a8997fce9fa5b70b0ab63a85f0fe4ed
SHA5121a6d0de77c5eae138bda671a92f0b575a53eaa50fe4497891dd2fb0b28930a412e62ca5c530cac5b04521039c803c61634a119c43eae19e090bd6801667bfdef
-
Filesize
1.3MB
MD518aff3e4889a949829bc9db91bac2d79
SHA1b3c1b0d0057828348cea1cb8e3ed88d347fdf6c8
SHA256bc6c612c9ca5e9e50c9ef1474ee587b93a8997fce9fa5b70b0ab63a85f0fe4ed
SHA5121a6d0de77c5eae138bda671a92f0b575a53eaa50fe4497891dd2fb0b28930a412e62ca5c530cac5b04521039c803c61634a119c43eae19e090bd6801667bfdef
-
Filesize
1.3MB
MD518aff3e4889a949829bc9db91bac2d79
SHA1b3c1b0d0057828348cea1cb8e3ed88d347fdf6c8
SHA256bc6c612c9ca5e9e50c9ef1474ee587b93a8997fce9fa5b70b0ab63a85f0fe4ed
SHA5121a6d0de77c5eae138bda671a92f0b575a53eaa50fe4497891dd2fb0b28930a412e62ca5c530cac5b04521039c803c61634a119c43eae19e090bd6801667bfdef
-
Filesize
1.3MB
MD518aff3e4889a949829bc9db91bac2d79
SHA1b3c1b0d0057828348cea1cb8e3ed88d347fdf6c8
SHA256bc6c612c9ca5e9e50c9ef1474ee587b93a8997fce9fa5b70b0ab63a85f0fe4ed
SHA5121a6d0de77c5eae138bda671a92f0b575a53eaa50fe4497891dd2fb0b28930a412e62ca5c530cac5b04521039c803c61634a119c43eae19e090bd6801667bfdef