Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2023, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe
Resource
win10v2004-20230703-en
General
-
Target
d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe
-
Size
1.4MB
-
MD5
2a86ef590f6d68c50b7a0f0182d43921
-
SHA1
9050245b755e5b858edbdf87d56fba44371b1269
-
SHA256
d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb
-
SHA512
ad389245206aa749c553a7a4702037be03302b7146ded4640a5468dee1ba4b730b6c3fc51800581a1666beffa956df2249e55f00175edd042f7bcbaeae682c7b
-
SSDEEP
24576:8cbD/e1EBDg/GBIydvwP8DbPR1vx7syRPMirHIBS9/Q3t+E+c0aNxD:8cbi6QGBI38Dbl7rRPMOIBoQ3tvXD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe -
Loads dropped DLL 3 IoCs
pid Process 1348 rundll32.exe 1348 rundll32.exe 3644 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4892 wrote to memory of 208 4892 d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe 85 PID 4892 wrote to memory of 208 4892 d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe 85 PID 4892 wrote to memory of 208 4892 d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe 85 PID 208 wrote to memory of 1348 208 control.exe 88 PID 208 wrote to memory of 1348 208 control.exe 88 PID 208 wrote to memory of 1348 208 control.exe 88 PID 1348 wrote to memory of 2484 1348 rundll32.exe 91 PID 1348 wrote to memory of 2484 1348 rundll32.exe 91 PID 2484 wrote to memory of 3644 2484 RunDll32.exe 92 PID 2484 wrote to memory of 3644 2484 RunDll32.exe 92 PID 2484 wrote to memory of 3644 2484 RunDll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe"C:\Users\Admin\AppData\Local\Temp\d35c61a3401098c3ac9710e5eeddaabaa26d966ab0acbadae1c467e2cfcdabeb.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\YSLWYTFP.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\YSLWYTFP.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\YSLWYTFP.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\YSLWYTFP.CPL",5⤵
- Loads dropped DLL
PID:3644
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5cb3db10961bb75fc4806432dc3042878
SHA104e6cb071b68e7e040173321b5247854d78e9193
SHA256405e3faacba9f320e2ad5b83e961bf5d108ecc0a524892d21de5ee2dc16ea4a7
SHA51206e6431cefcefaf1b0a1b419369b5e0b677807885f4d7dcf026984451767ae0e810a7c124dc4b733b6f96470127c2145ab9266f9b8454b5c07824076fffea671
-
Filesize
1.2MB
MD5cb3db10961bb75fc4806432dc3042878
SHA104e6cb071b68e7e040173321b5247854d78e9193
SHA256405e3faacba9f320e2ad5b83e961bf5d108ecc0a524892d21de5ee2dc16ea4a7
SHA51206e6431cefcefaf1b0a1b419369b5e0b677807885f4d7dcf026984451767ae0e810a7c124dc4b733b6f96470127c2145ab9266f9b8454b5c07824076fffea671
-
Filesize
1.2MB
MD5cb3db10961bb75fc4806432dc3042878
SHA104e6cb071b68e7e040173321b5247854d78e9193
SHA256405e3faacba9f320e2ad5b83e961bf5d108ecc0a524892d21de5ee2dc16ea4a7
SHA51206e6431cefcefaf1b0a1b419369b5e0b677807885f4d7dcf026984451767ae0e810a7c124dc4b733b6f96470127c2145ab9266f9b8454b5c07824076fffea671
-
Filesize
1.2MB
MD5cb3db10961bb75fc4806432dc3042878
SHA104e6cb071b68e7e040173321b5247854d78e9193
SHA256405e3faacba9f320e2ad5b83e961bf5d108ecc0a524892d21de5ee2dc16ea4a7
SHA51206e6431cefcefaf1b0a1b419369b5e0b677807885f4d7dcf026984451767ae0e810a7c124dc4b733b6f96470127c2145ab9266f9b8454b5c07824076fffea671
-
Filesize
1.2MB
MD5cb3db10961bb75fc4806432dc3042878
SHA104e6cb071b68e7e040173321b5247854d78e9193
SHA256405e3faacba9f320e2ad5b83e961bf5d108ecc0a524892d21de5ee2dc16ea4a7
SHA51206e6431cefcefaf1b0a1b419369b5e0b677807885f4d7dcf026984451767ae0e810a7c124dc4b733b6f96470127c2145ab9266f9b8454b5c07824076fffea671