Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230824-en -
resource tags
arch:x64arch:x86image:win10v2004-20230824-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2023 00:05
Static task
static1
Behavioral task
behavioral1
Sample
3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f.exe
Resource
win10v2004-20230824-en
General
-
Target
3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f.exe
-
Size
3.1MB
-
MD5
3360ed59e6b5a767223845de4c8a8722
-
SHA1
5a6ad13aad347b051e1140ea75cba2bb908aee50
-
SHA256
3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f
-
SHA512
463197f85c8181a8a365692a304eb5b21d2abe8518354088f11c882b96468574626e64b3597cac4fa0ce3ecf44bdd8b0980023d175c8084b716dc55af498623d
-
SSDEEP
98304:kWhSeBfKEKEmhApqPxNhNW0nh8MOImeZcH6tZimw0gxT4:Cn4pcxNa0hAImeZcHm//
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2932 rundll32.exe 2932 rundll32.exe 4084 rundll32.exe 4084 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-642304425-1816607141-2958861556-1000_Classes\Local Settings 3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3592 wrote to memory of 4196 3592 3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f.exe 87 PID 3592 wrote to memory of 4196 3592 3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f.exe 87 PID 3592 wrote to memory of 4196 3592 3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f.exe 87 PID 4196 wrote to memory of 2932 4196 control.exe 89 PID 4196 wrote to memory of 2932 4196 control.exe 89 PID 4196 wrote to memory of 2932 4196 control.exe 89 PID 2932 wrote to memory of 3196 2932 rundll32.exe 91 PID 2932 wrote to memory of 3196 2932 rundll32.exe 91 PID 3196 wrote to memory of 4084 3196 RunDll32.exe 92 PID 3196 wrote to memory of 4084 3196 RunDll32.exe 92 PID 3196 wrote to memory of 4084 3196 RunDll32.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f.exe"C:\Users\Admin\AppData\Local\Temp\3fe822301a31d7f3d2d08683ea2921fa5142740194e847fd4ccefc688d2e205f.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\mqH6rB.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\mqH6rB.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\mqH6rB.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\mqH6rB.cPl",5⤵
- Loads dropped DLL
PID:4084
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5f210aedc70fa7597ebea2bac4d4f6560
SHA14f1cedc74b55cdee8360fbaf5d665e695fe9ed32
SHA2566193b2c2e1a9718fa315a7d30eddb6f194d405cec2cf7ea8794aeca80f9a05f2
SHA512ddecf92c8575c02dbb188ffbcc27257be1e6de863cd5711b725ed71b29077cf51e55a147874830193644afd9f7698805ce9e90d057ad997f46bd6adebc5f601e
-
Filesize
2.5MB
MD5f210aedc70fa7597ebea2bac4d4f6560
SHA14f1cedc74b55cdee8360fbaf5d665e695fe9ed32
SHA2566193b2c2e1a9718fa315a7d30eddb6f194d405cec2cf7ea8794aeca80f9a05f2
SHA512ddecf92c8575c02dbb188ffbcc27257be1e6de863cd5711b725ed71b29077cf51e55a147874830193644afd9f7698805ce9e90d057ad997f46bd6adebc5f601e
-
Filesize
2.5MB
MD5f210aedc70fa7597ebea2bac4d4f6560
SHA14f1cedc74b55cdee8360fbaf5d665e695fe9ed32
SHA2566193b2c2e1a9718fa315a7d30eddb6f194d405cec2cf7ea8794aeca80f9a05f2
SHA512ddecf92c8575c02dbb188ffbcc27257be1e6de863cd5711b725ed71b29077cf51e55a147874830193644afd9f7698805ce9e90d057ad997f46bd6adebc5f601e
-
Filesize
2.5MB
MD5f210aedc70fa7597ebea2bac4d4f6560
SHA14f1cedc74b55cdee8360fbaf5d665e695fe9ed32
SHA2566193b2c2e1a9718fa315a7d30eddb6f194d405cec2cf7ea8794aeca80f9a05f2
SHA512ddecf92c8575c02dbb188ffbcc27257be1e6de863cd5711b725ed71b29077cf51e55a147874830193644afd9f7698805ce9e90d057ad997f46bd6adebc5f601e
-
Filesize
2.5MB
MD5f210aedc70fa7597ebea2bac4d4f6560
SHA14f1cedc74b55cdee8360fbaf5d665e695fe9ed32
SHA2566193b2c2e1a9718fa315a7d30eddb6f194d405cec2cf7ea8794aeca80f9a05f2
SHA512ddecf92c8575c02dbb188ffbcc27257be1e6de863cd5711b725ed71b29077cf51e55a147874830193644afd9f7698805ce9e90d057ad997f46bd6adebc5f601e
-
Filesize
2.5MB
MD5f210aedc70fa7597ebea2bac4d4f6560
SHA14f1cedc74b55cdee8360fbaf5d665e695fe9ed32
SHA2566193b2c2e1a9718fa315a7d30eddb6f194d405cec2cf7ea8794aeca80f9a05f2
SHA512ddecf92c8575c02dbb188ffbcc27257be1e6de863cd5711b725ed71b29077cf51e55a147874830193644afd9f7698805ce9e90d057ad997f46bd6adebc5f601e