Analysis
-
max time kernel
128s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2023, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d.exe
Resource
win10v2004-20230703-en
General
-
Target
7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d.exe
-
Size
2.8MB
-
MD5
f3c7a1989d04b8641261ec25cfdc7e41
-
SHA1
54d80f6d5cae89184197aeaaeb797ca8a5bdedc8
-
SHA256
7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d
-
SHA512
f05ea72e4f0f4c6702d62ea6fadca2dd4a0c534a5b56c0362ef328305b102ad92fe52f97d3a63f593d72d079b4d5cb3d9232306c506d8502cd4d199c1282f63f
-
SSDEEP
49152:HdgoAtbKFwR8PjNdGQfkuU2RopZz/8K4OEr106ywgS/ImJ/X6oNoUmzAbIvl:H+bCvPjfs2Wj1ErO6ywB/Rv9NZpq
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4784 rundll32.exe 2228 rundll32.exe 2228 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings 7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4264 wrote to memory of 2576 4264 7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d.exe 81 PID 4264 wrote to memory of 2576 4264 7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d.exe 81 PID 4264 wrote to memory of 2576 4264 7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d.exe 81 PID 2576 wrote to memory of 4784 2576 control.exe 83 PID 2576 wrote to memory of 4784 2576 control.exe 83 PID 2576 wrote to memory of 4784 2576 control.exe 83 PID 4784 wrote to memory of 4436 4784 rundll32.exe 88 PID 4784 wrote to memory of 4436 4784 rundll32.exe 88 PID 4436 wrote to memory of 2228 4436 RunDll32.exe 89 PID 4436 wrote to memory of 2228 4436 RunDll32.exe 89 PID 4436 wrote to memory of 2228 4436 RunDll32.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d.exe"C:\Users\Admin\AppData\Local\Temp\7969c21db8b84f425da517cdfcd869980dba393186641d74843bd2f0390fb54d.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\OMAVG_.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\OMAVG_.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\OMAVG_.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\OMAVG_.CpL",5⤵
- Loads dropped DLL
PID:2228
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD5ac2b1e3806c36082af86dee52d4af1b1
SHA118c3a5c18180b4094855c3d91406744912f62437
SHA25695a4de28c3ebb7e05d8d887ac89a2f82dbbafd43f45bb55dcd52b9a1a568644a
SHA51259a84c348b15193c99b257d87509f30fb9b15eb360745493ceef27c80354e6a9119a2b5fc2e52a76e5b2ccf5b4c8a81e96d7cfc569bab756dabe52a509603389
-
Filesize
2.3MB
MD5ac2b1e3806c36082af86dee52d4af1b1
SHA118c3a5c18180b4094855c3d91406744912f62437
SHA25695a4de28c3ebb7e05d8d887ac89a2f82dbbafd43f45bb55dcd52b9a1a568644a
SHA51259a84c348b15193c99b257d87509f30fb9b15eb360745493ceef27c80354e6a9119a2b5fc2e52a76e5b2ccf5b4c8a81e96d7cfc569bab756dabe52a509603389
-
Filesize
2.3MB
MD5ac2b1e3806c36082af86dee52d4af1b1
SHA118c3a5c18180b4094855c3d91406744912f62437
SHA25695a4de28c3ebb7e05d8d887ac89a2f82dbbafd43f45bb55dcd52b9a1a568644a
SHA51259a84c348b15193c99b257d87509f30fb9b15eb360745493ceef27c80354e6a9119a2b5fc2e52a76e5b2ccf5b4c8a81e96d7cfc569bab756dabe52a509603389
-
Filesize
2.3MB
MD5ac2b1e3806c36082af86dee52d4af1b1
SHA118c3a5c18180b4094855c3d91406744912f62437
SHA25695a4de28c3ebb7e05d8d887ac89a2f82dbbafd43f45bb55dcd52b9a1a568644a
SHA51259a84c348b15193c99b257d87509f30fb9b15eb360745493ceef27c80354e6a9119a2b5fc2e52a76e5b2ccf5b4c8a81e96d7cfc569bab756dabe52a509603389
-
Filesize
2.3MB
MD5ac2b1e3806c36082af86dee52d4af1b1
SHA118c3a5c18180b4094855c3d91406744912f62437
SHA25695a4de28c3ebb7e05d8d887ac89a2f82dbbafd43f45bb55dcd52b9a1a568644a
SHA51259a84c348b15193c99b257d87509f30fb9b15eb360745493ceef27c80354e6a9119a2b5fc2e52a76e5b2ccf5b4c8a81e96d7cfc569bab756dabe52a509603389