Analysis
-
max time kernel
126s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
21/09/2023, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496.exe
Resource
win10-20230831-en
General
-
Target
57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496.exe
-
Size
1.8MB
-
MD5
3855f1101c8a7ecef42c735c82237834
-
SHA1
515e38b231e6215a3619e1e9b7f4fc8961ea8916
-
SHA256
57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496
-
SHA512
e59f83a6caf328d9efaaa033a36a3795c580782902ac0e4fbdef99ef702dd09556357236b450a328fff0d70f1138fad759327abea8a6cad3b4dddb62391a8eb4
-
SSDEEP
24576:DubsnafAPycJUIDu358UT6jfla5yd2z/t5muJwN/P8DoFF79Ebu1/A3k8KWuZC81:rLLDuJnTMI5y2t5muiZ+oP9+u1teuEaz
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2020 rundll32.exe 4328 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000_Classes\Local Settings 57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 164 wrote to memory of 4472 164 57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496.exe 70 PID 164 wrote to memory of 4472 164 57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496.exe 70 PID 164 wrote to memory of 4472 164 57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496.exe 70 PID 4472 wrote to memory of 2020 4472 control.exe 72 PID 4472 wrote to memory of 2020 4472 control.exe 72 PID 4472 wrote to memory of 2020 4472 control.exe 72 PID 2020 wrote to memory of 3892 2020 rundll32.exe 73 PID 2020 wrote to memory of 3892 2020 rundll32.exe 73 PID 3892 wrote to memory of 4328 3892 RunDll32.exe 74 PID 3892 wrote to memory of 4328 3892 RunDll32.exe 74 PID 3892 wrote to memory of 4328 3892 RunDll32.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496.exe"C:\Users\Admin\AppData\Local\Temp\57adee9aa737c4298e39bbf9a5ca62e589e250f80c807ec281c90efdb301c496.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:164 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\8J0E1KNM.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8J0E1KNM.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\8J0E1KNM.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\8J0E1KNM.CPl",5⤵
- Loads dropped DLL
PID:4328
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5d7663280890f5e2d4342abbbd47fcb8a
SHA112d3a997d500cb6026cd93be1681dda66dd57ffa
SHA256025276213939c0b62b725f11ba0404aaecc2edc3c884aff8a16ca145f1c05c91
SHA5122cb2032aeeb0ef594c78ed6d998b2f34ac434a56e06a1658d4046e285fffc2f3a8e8377ef3abab7527e7829517b3fc55f6e30fd1fe8645b517550e8f24d3c161
-
Filesize
1.4MB
MD5d7663280890f5e2d4342abbbd47fcb8a
SHA112d3a997d500cb6026cd93be1681dda66dd57ffa
SHA256025276213939c0b62b725f11ba0404aaecc2edc3c884aff8a16ca145f1c05c91
SHA5122cb2032aeeb0ef594c78ed6d998b2f34ac434a56e06a1658d4046e285fffc2f3a8e8377ef3abab7527e7829517b3fc55f6e30fd1fe8645b517550e8f24d3c161
-
Filesize
1.4MB
MD5d7663280890f5e2d4342abbbd47fcb8a
SHA112d3a997d500cb6026cd93be1681dda66dd57ffa
SHA256025276213939c0b62b725f11ba0404aaecc2edc3c884aff8a16ca145f1c05c91
SHA5122cb2032aeeb0ef594c78ed6d998b2f34ac434a56e06a1658d4046e285fffc2f3a8e8377ef3abab7527e7829517b3fc55f6e30fd1fe8645b517550e8f24d3c161