Analysis

  • max time kernel
    139s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2023 03:35

General

  • Target

    0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe

  • Size

    2.5MB

  • MD5

    e37de11776bc36c7847bb9185cc9494a

  • SHA1

    288c9815181074d7be72265090d5170823bc2ca0

  • SHA256

    0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a

  • SHA512

    c43346f34d330b0efd57ec1c0dfcf1dd54e945b2b9555d6aa35fc8efffc2df1759751b04753ac53b974e68e054a91cba8e58a4c8a1194dc4699e62b5e05fab35

  • SSDEEP

    49152:acbz6hmKrjMr66WFoUdOKvWNAR0SIbIWQ5j2zgNXsh+FIm5q5q/n:acbM/Mr66WMzGcIWQ5Cmbaw

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe
    "C:\Users\Admin\AppData\Local\Temp\0b6357a7cc478ab3431eb41a331313d73e2e5defee5bba7d20fb0df3cfcd111a.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4644
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:5076
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1552
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl",
            5⤵
            • Loads dropped DLL
            PID:1300

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BaWgQFB.cPl

    Filesize

    2.3MB

    MD5

    19409ec7f9a8501c9bcf667489e910dc

    SHA1

    7cac8fc6f42253cd658890abdf6b4e10c72c8970

    SHA256

    e5651c2f524a5b9b4628f545daae906c269458ba570ba2ea6446ea17f9f35476

    SHA512

    d51d5884a5b7fc8a4e10df437fb6d154d87087d3a11031a9dd2ed1751c08fca1930c7926b791e7d5fce6385cece4d37580fd12d8d4f125e8dcd784e85e088529

  • C:\Users\Admin\AppData\Local\Temp\BawgQFB.cpl

    Filesize

    2.3MB

    MD5

    19409ec7f9a8501c9bcf667489e910dc

    SHA1

    7cac8fc6f42253cd658890abdf6b4e10c72c8970

    SHA256

    e5651c2f524a5b9b4628f545daae906c269458ba570ba2ea6446ea17f9f35476

    SHA512

    d51d5884a5b7fc8a4e10df437fb6d154d87087d3a11031a9dd2ed1751c08fca1930c7926b791e7d5fce6385cece4d37580fd12d8d4f125e8dcd784e85e088529

  • C:\Users\Admin\AppData\Local\Temp\BawgQFB.cpl

    Filesize

    2.3MB

    MD5

    19409ec7f9a8501c9bcf667489e910dc

    SHA1

    7cac8fc6f42253cd658890abdf6b4e10c72c8970

    SHA256

    e5651c2f524a5b9b4628f545daae906c269458ba570ba2ea6446ea17f9f35476

    SHA512

    d51d5884a5b7fc8a4e10df437fb6d154d87087d3a11031a9dd2ed1751c08fca1930c7926b791e7d5fce6385cece4d37580fd12d8d4f125e8dcd784e85e088529

  • C:\Users\Admin\AppData\Local\Temp\BawgQFB.cpl

    Filesize

    2.3MB

    MD5

    19409ec7f9a8501c9bcf667489e910dc

    SHA1

    7cac8fc6f42253cd658890abdf6b4e10c72c8970

    SHA256

    e5651c2f524a5b9b4628f545daae906c269458ba570ba2ea6446ea17f9f35476

    SHA512

    d51d5884a5b7fc8a4e10df437fb6d154d87087d3a11031a9dd2ed1751c08fca1930c7926b791e7d5fce6385cece4d37580fd12d8d4f125e8dcd784e85e088529

  • memory/1300-162-0x0000000003300000-0x00000000033E3000-memory.dmp

    Filesize

    908KB

  • memory/1300-161-0x0000000003300000-0x00000000033E3000-memory.dmp

    Filesize

    908KB

  • memory/1300-159-0x0000000003300000-0x00000000033E3000-memory.dmp

    Filesize

    908KB

  • memory/1300-157-0x0000000003200000-0x00000000032FB000-memory.dmp

    Filesize

    1004KB

  • memory/1300-154-0x0000000002990000-0x0000000002996000-memory.dmp

    Filesize

    24KB

  • memory/5076-145-0x0000000000400000-0x0000000000643000-memory.dmp

    Filesize

    2.3MB

  • memory/5076-152-0x0000000002F70000-0x0000000003053000-memory.dmp

    Filesize

    908KB

  • memory/5076-151-0x0000000002F70000-0x0000000003053000-memory.dmp

    Filesize

    908KB

  • memory/5076-149-0x0000000002F70000-0x0000000003053000-memory.dmp

    Filesize

    908KB

  • memory/5076-148-0x0000000002F70000-0x0000000003053000-memory.dmp

    Filesize

    908KB

  • memory/5076-147-0x0000000002E70000-0x0000000002F6B000-memory.dmp

    Filesize

    1004KB

  • memory/5076-144-0x0000000002AB0000-0x0000000002AB6000-memory.dmp

    Filesize

    24KB