Analysis
-
max time kernel
126s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2023 08:05
Static task
static1
Behavioral task
behavioral1
Sample
abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe
Resource
win10v2004-20230703-en
General
-
Target
abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe
-
Size
2.5MB
-
MD5
42a7eeda7c16a953ac332339b8e39492
-
SHA1
3a19aa6964e15f84cf657a5e1d42e68d48cd94a1
-
SHA256
abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b
-
SHA512
9633d7fe0e091e8fa96c4ab63b1c781a47a94ab241ff8e4aa215f9043f17f2c98066f50abd6c10e2ea45e48c12a20f904afd374de37666f5474b7724f6cca697
-
SSDEEP
49152:mDkUrjJ3VFio/x+cbWfw9Zon6haCL+gIieMtaNuwlxI6WPeCKlLHldz:m4UpTi4TCYYvCL+E9ta5WGCKlLF5
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 4192 rundll32.exe 4192 rundll32.exe 4956 rundll32.exe 4956 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000_Classes\Local Settings abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1976 3424 abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe 83 PID 3424 wrote to memory of 1976 3424 abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe 83 PID 3424 wrote to memory of 1976 3424 abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe 83 PID 1976 wrote to memory of 4192 1976 control.exe 85 PID 1976 wrote to memory of 4192 1976 control.exe 85 PID 1976 wrote to memory of 4192 1976 control.exe 85 PID 4192 wrote to memory of 3700 4192 rundll32.exe 93 PID 4192 wrote to memory of 3700 4192 rundll32.exe 93 PID 3700 wrote to memory of 4956 3700 RunDll32.exe 94 PID 3700 wrote to memory of 4956 3700 RunDll32.exe 94 PID 3700 wrote to memory of 4956 3700 RunDll32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe"C:\Users\Admin\AppData\Local\Temp\abfc890e10032f8d3022a650be151f5c03a0b01275ba8e07096e8726dd78512b.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\I8a~ZK3I.cPl",5⤵
- Loads dropped DLL
PID:4956
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.3MB
MD52fa1afea94737427152b3a6484ba2e2b
SHA12a927a6250dd9ed819f0821736fbb9ab82f27d07
SHA256f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c
SHA51232c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac
-
Filesize
2.3MB
MD52fa1afea94737427152b3a6484ba2e2b
SHA12a927a6250dd9ed819f0821736fbb9ab82f27d07
SHA256f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c
SHA51232c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac
-
Filesize
2.3MB
MD52fa1afea94737427152b3a6484ba2e2b
SHA12a927a6250dd9ed819f0821736fbb9ab82f27d07
SHA256f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c
SHA51232c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac
-
Filesize
2.3MB
MD52fa1afea94737427152b3a6484ba2e2b
SHA12a927a6250dd9ed819f0821736fbb9ab82f27d07
SHA256f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c
SHA51232c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac
-
Filesize
2.3MB
MD52fa1afea94737427152b3a6484ba2e2b
SHA12a927a6250dd9ed819f0821736fbb9ab82f27d07
SHA256f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c
SHA51232c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac
-
Filesize
2.3MB
MD52fa1afea94737427152b3a6484ba2e2b
SHA12a927a6250dd9ed819f0821736fbb9ab82f27d07
SHA256f5f362c92c29ac8d8ae1ecc84ee7315f03547bb4815a409c35d52554db1dda9c
SHA51232c238e8cd569308255df88595b038366a58647af1be7296867f7c4dee97a07cf9cf04f0800697e9b45b489660677f0a343d38e28b6146e2f8005877088062ac