Analysis
-
max time kernel
123s -
max time network
129s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
23-09-2023 07:45
Static task
static1
Behavioral task
behavioral1
Sample
4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44.exe
Resource
win10-20230915-en
General
-
Target
4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44.exe
-
Size
1.8MB
-
MD5
f3b5642efeb4100b1aad6e1754cc87fd
-
SHA1
88f1cca253fdcff149f319acb2fe82d0c520fe03
-
SHA256
4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44
-
SHA512
df91cd5c84b81e1a81963134bfb10a5442c3aec386bb72cf41242d8d8294a6791458f2384bfa212c8e1fdb19dcab441dbd95b7391d9add5994e068e1b0a3b8d0
-
SSDEEP
49152:acbz6wFRFC1KS7Tl5LqAP0mhSLXePx2PwjV6O:acbXFCP7XvsXeQ4jVj
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1200 rundll32.exe 4544 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-844837608-3875958368-2945961404-1000_Classes\Local Settings 4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 996 wrote to memory of 2852 996 4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44.exe 70 PID 996 wrote to memory of 2852 996 4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44.exe 70 PID 996 wrote to memory of 2852 996 4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44.exe 70 PID 2852 wrote to memory of 1200 2852 control.exe 72 PID 2852 wrote to memory of 1200 2852 control.exe 72 PID 2852 wrote to memory of 1200 2852 control.exe 72 PID 1200 wrote to memory of 5020 1200 rundll32.exe 73 PID 1200 wrote to memory of 5020 1200 rundll32.exe 73 PID 5020 wrote to memory of 4544 5020 RunDll32.exe 74 PID 5020 wrote to memory of 4544 5020 RunDll32.exe 74 PID 5020 wrote to memory of 4544 5020 RunDll32.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44.exe"C:\Users\Admin\AppData\Local\Temp\4554ce7c5fd5d4f4f839e9e12356c22d45890e40955ccb7e0213e40ed1c90f44.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\EPmLZCCk.cpL",2⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\EPmLZCCk.cpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\EPmLZCCk.cpL",4⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\EPmLZCCk.cpL",5⤵
- Loads dropped DLL
PID:4544
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5bc7c1115bf1be21e25bd9e850687645a
SHA178f9cb0d84213282936befd4de5d1a2f022c48b3
SHA25679dd65d8376b35a4212a01ced74759cd2119dd069e1025d3aa4c9e9bafa7ffd2
SHA512ef9e1bc95a3c331d9f37775bb31d6ffb98936b39c2e83db8ab21ada5115603cf4641953238810da9e3a24b71f383dbbde25a8123d174af8a11c241b9209cfff6
-
Filesize
1.6MB
MD5bc7c1115bf1be21e25bd9e850687645a
SHA178f9cb0d84213282936befd4de5d1a2f022c48b3
SHA25679dd65d8376b35a4212a01ced74759cd2119dd069e1025d3aa4c9e9bafa7ffd2
SHA512ef9e1bc95a3c331d9f37775bb31d6ffb98936b39c2e83db8ab21ada5115603cf4641953238810da9e3a24b71f383dbbde25a8123d174af8a11c241b9209cfff6
-
Filesize
1.6MB
MD5bc7c1115bf1be21e25bd9e850687645a
SHA178f9cb0d84213282936befd4de5d1a2f022c48b3
SHA25679dd65d8376b35a4212a01ced74759cd2119dd069e1025d3aa4c9e9bafa7ffd2
SHA512ef9e1bc95a3c331d9f37775bb31d6ffb98936b39c2e83db8ab21ada5115603cf4641953238810da9e3a24b71f383dbbde25a8123d174af8a11c241b9209cfff6