Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 03:35
Static task
static1
Behavioral task
behavioral1
Sample
0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe
Resource
win10v2004-20230703-en
General
-
Target
0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe
-
Size
2.5MB
-
MD5
e37de11776bc36c7847bb9185cc9494a
-
SHA1
288c9815181074d7be72265090d5170823bc2ca0
-
SHA256
0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a
-
SHA512
c43346f34d330b0efd57ec1c0dfcf1dd54e945b2b9555d6aa35fc8efffc2df1759751b04753ac53b974e68e054a91cba8e58a4c8a1194dc4699e62b5e05fab35
-
SSDEEP
49152:acbz6hmKrjMr66WFoUdOKvWNAR0SIbIWQ5j2zgNXsh+FIm5q5q/n:acbM/Mr66WMzGcIWQ5Cmbaw
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 5076 rundll32.exe 1300 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000_Classes\Local Settings 0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3940 wrote to memory of 4644 3940 0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe 80 PID 3940 wrote to memory of 4644 3940 0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe 80 PID 3940 wrote to memory of 4644 3940 0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe 80 PID 4644 wrote to memory of 5076 4644 control.exe 82 PID 4644 wrote to memory of 5076 4644 control.exe 82 PID 4644 wrote to memory of 5076 4644 control.exe 82 PID 5076 wrote to memory of 1552 5076 rundll32.exe 86 PID 5076 wrote to memory of 1552 5076 rundll32.exe 86 PID 1552 wrote to memory of 1300 1552 RunDll32.exe 87 PID 1552 wrote to memory of 1300 1552 RunDll32.exe 87 PID 1552 wrote to memory of 1300 1552 RunDll32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe"C:\Users\Admin\AppData\Local\Temp\0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl",5⤵
- Loads dropped DLL
PID:1300
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD519409ec7f9a8501c9bcf667489e910dc
SHA17cac8fc6f42253cd658890abdf6b4e10c72c8970
SHA256e5651c2f524a5b9b4628f545daae906c269458ba570ba2ea6446ea17f9f35476
SHA512d51d5884a5b7fc8a4e10df437fb6d154d87087d3a11031a9dd2ed1751c08fca1930c7926b791e7d5fce6385cece4d37580fd12d8d4f125e8dcd784e85e088529
-
Filesize
2.3MB
MD519409ec7f9a8501c9bcf667489e910dc
SHA17cac8fc6f42253cd658890abdf6b4e10c72c8970
SHA256e5651c2f524a5b9b4628f545daae906c269458ba570ba2ea6446ea17f9f35476
SHA512d51d5884a5b7fc8a4e10df437fb6d154d87087d3a11031a9dd2ed1751c08fca1930c7926b791e7d5fce6385cece4d37580fd12d8d4f125e8dcd784e85e088529
-
Filesize
2.3MB
MD519409ec7f9a8501c9bcf667489e910dc
SHA17cac8fc6f42253cd658890abdf6b4e10c72c8970
SHA256e5651c2f524a5b9b4628f545daae906c269458ba570ba2ea6446ea17f9f35476
SHA512d51d5884a5b7fc8a4e10df437fb6d154d87087d3a11031a9dd2ed1751c08fca1930c7926b791e7d5fce6385cece4d37580fd12d8d4f125e8dcd784e85e088529
-
Filesize
2.3MB
MD519409ec7f9a8501c9bcf667489e910dc
SHA17cac8fc6f42253cd658890abdf6b4e10c72c8970
SHA256e5651c2f524a5b9b4628f545daae906c269458ba570ba2ea6446ea17f9f35476
SHA512d51d5884a5b7fc8a4e10df437fb6d154d87087d3a11031a9dd2ed1751c08fca1930c7926b791e7d5fce6385cece4d37580fd12d8d4f125e8dcd784e85e088529