Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
26/08/2023, 10:00
Static task
static1
Behavioral task
behavioral1
Sample
4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d.exe
Resource
win10-20230703-en
General
-
Target
4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d.exe
-
Size
2.5MB
-
MD5
1b73d1cc98ff8eaf1789d442eb40169c
-
SHA1
ebf8a653aa877c6ab6a76576134bc2d2b15be224
-
SHA256
4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d
-
SHA512
59dbf2e3a07dd9c41bae418fdbd22fbef1678a2417ce84b36748dbc9ac0c8e2851cb09355e4d595c947fe51a46add6bd6f047e4ceecf5f258b2664358f78b8ed
-
SSDEEP
49152:PaqbBkD7KuB3X/croUYoyjk6W9VgJFgoTkV+GH/Q:PzkD+y3Uroxjk6CVgJSoTkBQ
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
pid Process 952 rundll32.exe 952 rundll32.exe 2872 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3229013990-3330391637-2814184332-1000_Classes\Local Settings 4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3164 wrote to memory of 4920 3164 4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d.exe 69 PID 3164 wrote to memory of 4920 3164 4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d.exe 69 PID 3164 wrote to memory of 4920 3164 4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d.exe 69 PID 4920 wrote to memory of 952 4920 control.exe 71 PID 4920 wrote to memory of 952 4920 control.exe 71 PID 4920 wrote to memory of 952 4920 control.exe 71 PID 952 wrote to memory of 4540 952 rundll32.exe 72 PID 952 wrote to memory of 4540 952 rundll32.exe 72 PID 4540 wrote to memory of 2872 4540 RunDll32.exe 73 PID 4540 wrote to memory of 2872 4540 RunDll32.exe 73 PID 4540 wrote to memory of 2872 4540 RunDll32.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d.exe"C:\Users\Admin\AppData\Local\Temp\4d8d71d65354cea4aee9ef96b82ff4d1b0488e96916ebdbb52b196ff7fb30e6d.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Y7vz9h1H.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Y7vz9h1H.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Y7vz9h1H.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Y7vz9h1H.cPl",5⤵
- Loads dropped DLL
PID:2872
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD55e680fb0b757a5c5aadbccc9119f8af5
SHA1355c9fdbe3adb2d77e251d91447e309882ef7835
SHA2566209c7cf27086bf643cba75362e69d8a6b172c4b328611a687c1981693254ab1
SHA5123d5c14521ae86694640c1a5874baa8ed061494f9ab193dce93d4c0855d0a2f33992b7fea6db391e9b6868715f25e75c06878e28955217976decfcccb7a983be5
-
Filesize
2.2MB
MD55e680fb0b757a5c5aadbccc9119f8af5
SHA1355c9fdbe3adb2d77e251d91447e309882ef7835
SHA2566209c7cf27086bf643cba75362e69d8a6b172c4b328611a687c1981693254ab1
SHA5123d5c14521ae86694640c1a5874baa8ed061494f9ab193dce93d4c0855d0a2f33992b7fea6db391e9b6868715f25e75c06878e28955217976decfcccb7a983be5
-
Filesize
2.2MB
MD55e680fb0b757a5c5aadbccc9119f8af5
SHA1355c9fdbe3adb2d77e251d91447e309882ef7835
SHA2566209c7cf27086bf643cba75362e69d8a6b172c4b328611a687c1981693254ab1
SHA5123d5c14521ae86694640c1a5874baa8ed061494f9ab193dce93d4c0855d0a2f33992b7fea6db391e9b6868715f25e75c06878e28955217976decfcccb7a983be5
-
Filesize
2.2MB
MD55e680fb0b757a5c5aadbccc9119f8af5
SHA1355c9fdbe3adb2d77e251d91447e309882ef7835
SHA2566209c7cf27086bf643cba75362e69d8a6b172c4b328611a687c1981693254ab1
SHA5123d5c14521ae86694640c1a5874baa8ed061494f9ab193dce93d4c0855d0a2f33992b7fea6db391e9b6868715f25e75c06878e28955217976decfcccb7a983be5