Analysis
-
max time kernel
128s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
24-08-2023 04:00
Static task
static1
Behavioral task
behavioral1
Sample
b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa.exe
Resource
win10-20230703-en
General
-
Target
b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa.exe
-
Size
2.7MB
-
MD5
80b7109dc32d2b115fae0360e5b2506b
-
SHA1
9f7c4905efdddfbd104d7ad267830999a03879df
-
SHA256
b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa
-
SHA512
1db63baf70741c819686fa9d775a8e3997d866da05b889330c80abd6772059952a2d2a90203c619603aeaf32548bcb1aaa8cb7493f44526b11831b14d7440832
-
SSDEEP
49152:8cbi6vVSduCViDk9FlMLqHEM4W2wlnxcjq7FdHDoV1Q8eYq:8cbtOlVn1ML2f4WNnT1SQB1
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 4884 rundll32.exe 4884 rundll32.exe 3036 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-488886677-2269338296-1239465872-1000_Classes\Local Settings b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 724 wrote to memory of 4540 724 b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa.exe 70 PID 724 wrote to memory of 4540 724 b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa.exe 70 PID 724 wrote to memory of 4540 724 b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa.exe 70 PID 4540 wrote to memory of 4884 4540 control.exe 72 PID 4540 wrote to memory of 4884 4540 control.exe 72 PID 4540 wrote to memory of 4884 4540 control.exe 72 PID 4884 wrote to memory of 4560 4884 rundll32.exe 73 PID 4884 wrote to memory of 4560 4884 rundll32.exe 73 PID 4560 wrote to memory of 3036 4560 RunDll32.exe 74 PID 4560 wrote to memory of 3036 4560 RunDll32.exe 74 PID 4560 wrote to memory of 3036 4560 RunDll32.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa.exe"C:\Users\Admin\AppData\Local\Temp\b4937301f177f2c82b83d07e05645a0974a308af1d215fbdd33eb3f244ab24fa.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\_A4eIUS9.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\_A4eIUS9.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\_A4eIUS9.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\_A4eIUS9.CPl",5⤵
- Loads dropped DLL
PID:3036
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD585d6a54b48b93379112ac260268f5dd0
SHA145bf1960af3f24d83fccd69819364160d3a3e56e
SHA2563de32d3e6b1fb56c94b01c713bfe1709bedd31c3878390741c8242982384192e
SHA51282b9f704c71ae3c95f198f9892970b3c9f9bcbb8aba3a863b23c03c75b62ac02cb936a844b4b709bc0f261e6b472a33fc6937e15f588c7024a60a3f189cc8dbc
-
Filesize
2.5MB
MD585d6a54b48b93379112ac260268f5dd0
SHA145bf1960af3f24d83fccd69819364160d3a3e56e
SHA2563de32d3e6b1fb56c94b01c713bfe1709bedd31c3878390741c8242982384192e
SHA51282b9f704c71ae3c95f198f9892970b3c9f9bcbb8aba3a863b23c03c75b62ac02cb936a844b4b709bc0f261e6b472a33fc6937e15f588c7024a60a3f189cc8dbc
-
Filesize
2.5MB
MD585d6a54b48b93379112ac260268f5dd0
SHA145bf1960af3f24d83fccd69819364160d3a3e56e
SHA2563de32d3e6b1fb56c94b01c713bfe1709bedd31c3878390741c8242982384192e
SHA51282b9f704c71ae3c95f198f9892970b3c9f9bcbb8aba3a863b23c03c75b62ac02cb936a844b4b709bc0f261e6b472a33fc6937e15f588c7024a60a3f189cc8dbc
-
Filesize
2.5MB
MD585d6a54b48b93379112ac260268f5dd0
SHA145bf1960af3f24d83fccd69819364160d3a3e56e
SHA2563de32d3e6b1fb56c94b01c713bfe1709bedd31c3878390741c8242982384192e
SHA51282b9f704c71ae3c95f198f9892970b3c9f9bcbb8aba3a863b23c03c75b62ac02cb936a844b4b709bc0f261e6b472a33fc6937e15f588c7024a60a3f189cc8dbc