Analysis
-
max time kernel
127s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
06/08/2023, 22:50
Static task
static1
Behavioral task
behavioral1
Sample
f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc.exe
Resource
win10-20230703-en
General
-
Target
f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc.exe
-
Size
2.5MB
-
MD5
dc989b8469c028ff4bf44766a33aa0b5
-
SHA1
509c35cff53ceef5abbef4f3e8515fffc0cd9350
-
SHA256
f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc
-
SHA512
b6c8a97c2b678cc88c75ae0cd8818a007b13b4293482b7dbaeb3347f996ee19f8fde4e93c9529a00df17533c93bf1e75432f7e12d6d0b4fdd5156b2660292875
-
SSDEEP
49152:mDkUrjllbpNG6nWB2Pn/Y+7quoCp4t6uChwwIYYq63CmcleroeEIodIgwq8:m4Ufa6nWBMn/YEqlCp+6B2RruuT3+wp
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 2744 rundll32.exe 4380 rundll32.exe 4380 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\Local Settings f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2908 wrote to memory of 4752 2908 f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc.exe 69 PID 2908 wrote to memory of 4752 2908 f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc.exe 69 PID 2908 wrote to memory of 4752 2908 f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc.exe 69 PID 4752 wrote to memory of 2744 4752 control.exe 71 PID 4752 wrote to memory of 2744 4752 control.exe 71 PID 4752 wrote to memory of 2744 4752 control.exe 71 PID 2744 wrote to memory of 4216 2744 rundll32.exe 72 PID 2744 wrote to memory of 4216 2744 rundll32.exe 72 PID 4216 wrote to memory of 4380 4216 RunDll32.exe 73 PID 4216 wrote to memory of 4380 4216 RunDll32.exe 73 PID 4216 wrote to memory of 4380 4216 RunDll32.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc.exe"C:\Users\Admin\AppData\Local\Temp\f97517f1dde1753ed9bd70f7742e1472fbb5883d7c8926b248485bee1042fffc.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\O5SYo5m.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\O5SYo5m.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\O5SYo5m.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\O5SYo5m.CPL",5⤵
- Loads dropped DLL
PID:4380
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5f8cf103aad86baf4238e50b74875b530
SHA1a32006234604808fdd9a0e7c9be3bc5d30b8a1da
SHA256846246ca68c10c72375ecd8a3b375a08a1cf37178af099f22372a6602eda650c
SHA51224dd12b9ca911b7b8a4880d0c733865ca8bb2fd8ce2131760ce66555b094e05acb931b112157de1c39ee99838cb0cdc6db15ad00bf1d0ebba598503a439c2edd
-
Filesize
2.3MB
MD5f8cf103aad86baf4238e50b74875b530
SHA1a32006234604808fdd9a0e7c9be3bc5d30b8a1da
SHA256846246ca68c10c72375ecd8a3b375a08a1cf37178af099f22372a6602eda650c
SHA51224dd12b9ca911b7b8a4880d0c733865ca8bb2fd8ce2131760ce66555b094e05acb931b112157de1c39ee99838cb0cdc6db15ad00bf1d0ebba598503a439c2edd
-
Filesize
2.3MB
MD5f8cf103aad86baf4238e50b74875b530
SHA1a32006234604808fdd9a0e7c9be3bc5d30b8a1da
SHA256846246ca68c10c72375ecd8a3b375a08a1cf37178af099f22372a6602eda650c
SHA51224dd12b9ca911b7b8a4880d0c733865ca8bb2fd8ce2131760ce66555b094e05acb931b112157de1c39ee99838cb0cdc6db15ad00bf1d0ebba598503a439c2edd
-
Filesize
2.3MB
MD5f8cf103aad86baf4238e50b74875b530
SHA1a32006234604808fdd9a0e7c9be3bc5d30b8a1da
SHA256846246ca68c10c72375ecd8a3b375a08a1cf37178af099f22372a6602eda650c
SHA51224dd12b9ca911b7b8a4880d0c733865ca8bb2fd8ce2131760ce66555b094e05acb931b112157de1c39ee99838cb0cdc6db15ad00bf1d0ebba598503a439c2edd