Analysis

  • max time kernel
    126s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2023 08:05

General

  • Target

    abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe

  • Size

    2.5MB

  • MD5

    42a7eeda7c16a953ac332339b8e39492

  • SHA1

    3a19aa6964e15f84cf657a5e1d42e68d48cd94a1

  • SHA256

    abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b

  • SHA512

    9633d7fe0e091e8fa96c4ab63b1c781a47a94ab241ff8e4aa215f9043f17f2c98066f50abd6c10e2ea45e48c12a20f904afd374de37666f5474b7724f6cca697

  • SSDEEP

    49152:mDkUrjJ3VFio/x+cbWfw9Zon6haCL+gIieMtaNuwlxI6WPeCKlLHldz:m4UpTi4TCYYvCL+E9ta5WGCKlLF5

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe
    "C:\Users\Admin\AppData\Local\Temp\abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl",
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4192
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl",
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3700
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl",
            5⤵
            • Loads dropped DLL
            PID:4956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl

    Filesize

    2.3MB

    MD5

    2fa1afea94737427152b3a6484ba2e2b

    SHA1

    2a927a6250dd9ed819f0821736fbb9ab82f27d07

    SHA256

    f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c

    SHA512

    32c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac

  • C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cpl

    Filesize

    2.3MB

    MD5

    2fa1afea94737427152b3a6484ba2e2b

    SHA1

    2a927a6250dd9ed819f0821736fbb9ab82f27d07

    SHA256

    f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c

    SHA512

    32c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac

  • C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cpl

    Filesize

    2.3MB

    MD5

    2fa1afea94737427152b3a6484ba2e2b

    SHA1

    2a927a6250dd9ed819f0821736fbb9ab82f27d07

    SHA256

    f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c

    SHA512

    32c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac

  • C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cpl

    Filesize

    2.3MB

    MD5

    2fa1afea94737427152b3a6484ba2e2b

    SHA1

    2a927a6250dd9ed819f0821736fbb9ab82f27d07

    SHA256

    f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c

    SHA512

    32c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac

  • C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cpl

    Filesize

    2.3MB

    MD5

    2fa1afea94737427152b3a6484ba2e2b

    SHA1

    2a927a6250dd9ed819f0821736fbb9ab82f27d07

    SHA256

    f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c

    SHA512

    32c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac

  • C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cpl

    Filesize

    2.3MB

    MD5

    2fa1afea94737427152b3a6484ba2e2b

    SHA1

    2a927a6250dd9ed819f0821736fbb9ab82f27d07

    SHA256

    f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c

    SHA512

    32c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac

  • memory/4192-154-0x0000000002B20000-0x0000000002C10000-memory.dmp

    Filesize

    960KB

  • memory/4192-145-0x0000000002430000-0x0000000002674000-memory.dmp

    Filesize

    2.3MB

  • memory/4192-150-0x0000000002B20000-0x0000000002C10000-memory.dmp

    Filesize

    960KB

  • memory/4192-153-0x0000000002B20000-0x0000000002C10000-memory.dmp

    Filesize

    960KB

  • memory/4192-147-0x0000000002430000-0x0000000002674000-memory.dmp

    Filesize

    2.3MB

  • memory/4192-149-0x0000000002A10000-0x0000000002B1B000-memory.dmp

    Filesize

    1.0MB

  • memory/4192-146-0x0000000002680000-0x0000000002686000-memory.dmp

    Filesize

    24KB

  • memory/4956-157-0x00000000024B0000-0x00000000026F4000-memory.dmp

    Filesize

    2.3MB

  • memory/4956-159-0x00000000024B0000-0x00000000026F4000-memory.dmp

    Filesize

    2.3MB

  • memory/4956-158-0x0000000002130000-0x0000000002136000-memory.dmp

    Filesize

    24KB

  • memory/4956-162-0x0000000002A70000-0x0000000002B7B000-memory.dmp

    Filesize

    1.0MB

  • memory/4956-163-0x0000000002B80000-0x0000000002C70000-memory.dmp

    Filesize

    960KB

  • memory/4956-166-0x0000000002B80000-0x0000000002C70000-memory.dmp

    Filesize

    960KB

  • memory/4956-167-0x0000000002B80000-0x0000000002C70000-memory.dmp

    Filesize

    960KB