Analysis
-
max time kernel
128s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
18/09/2023, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e.exe
Resource
win10-20230915-en
General
-
Target
ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e.exe
-
Size
1.7MB
-
MD5
6f976ced94fd2d7c7710d769518717b2
-
SHA1
7f83660011c28c001dbace656df28c5f6190cdca
-
SHA256
ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e
-
SHA512
ba7749269a22ff979ee13181f4df1cc7e132f1c49e23b622c70d1868eec6cc8224171899395fd2728494df9a59404a1f9903a7d263121da386253d569449cef9
-
SSDEEP
49152:Paqbk+lONhksHP5BL4fZpiLWSrcqSvGnKHiqjWl7s:Pt2qsxBQlNUnK16o
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4848 rundll32.exe 2116 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2204032094-4125186646-761438227-1000_Classes\Local Settings ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 528 wrote to memory of 2840 528 ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e.exe 70 PID 528 wrote to memory of 2840 528 ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e.exe 70 PID 528 wrote to memory of 2840 528 ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e.exe 70 PID 2840 wrote to memory of 4848 2840 control.exe 72 PID 2840 wrote to memory of 4848 2840 control.exe 72 PID 2840 wrote to memory of 4848 2840 control.exe 72 PID 4848 wrote to memory of 2140 4848 rundll32.exe 73 PID 4848 wrote to memory of 2140 4848 rundll32.exe 73 PID 2140 wrote to memory of 2116 2140 RunDll32.exe 74 PID 2140 wrote to memory of 2116 2140 RunDll32.exe 74 PID 2140 wrote to memory of 2116 2140 RunDll32.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e.exe"C:\Users\Admin\AppData\Local\Temp\ec3ef6a1748199c67b7e0a454305fa8566a42c1cb2717d1a24033f725ca08d8e.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\~Y86D4.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\~Y86D4.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\~Y86D4.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\~Y86D4.cPl",5⤵
- Loads dropped DLL
PID:2116
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5574092afef8e5b9898ea75a03b27deb7
SHA1ae0d385c82de5cb9919da894ab0594fd850fb246
SHA25656e9641babe131424cfbfe7df4696b0526f2dd0d8c6b5161008c870dbb405c18
SHA512dd380eae94f39b3bdc3f7eb286ade4cd32bd533a2180bc8a10199e9b2a00880aa291aa9e96358c6d5fb52e62ec979697b063e1c9324d29ce562015e6c752c66b
-
Filesize
1.4MB
MD5574092afef8e5b9898ea75a03b27deb7
SHA1ae0d385c82de5cb9919da894ab0594fd850fb246
SHA25656e9641babe131424cfbfe7df4696b0526f2dd0d8c6b5161008c870dbb405c18
SHA512dd380eae94f39b3bdc3f7eb286ade4cd32bd533a2180bc8a10199e9b2a00880aa291aa9e96358c6d5fb52e62ec979697b063e1c9324d29ce562015e6c752c66b
-
Filesize
1.4MB
MD5574092afef8e5b9898ea75a03b27deb7
SHA1ae0d385c82de5cb9919da894ab0594fd850fb246
SHA25656e9641babe131424cfbfe7df4696b0526f2dd0d8c6b5161008c870dbb405c18
SHA512dd380eae94f39b3bdc3f7eb286ade4cd32bd533a2180bc8a10199e9b2a00880aa291aa9e96358c6d5fb52e62ec979697b063e1c9324d29ce562015e6c752c66b