Analysis
-
max time kernel
139s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 13:52
Static task
static1
Behavioral task
behavioral1
Sample
ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe
Resource
win10v2004-20230915-en
General
-
Target
ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe
-
Size
1.7MB
-
MD5
9783bec4f09c7463038cab0749c39ffe
-
SHA1
563de407668db64db3ea1361b7a642d9bc6d0e5b
-
SHA256
ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476
-
SHA512
6efa8f3431bcc8de3f6be6ca144aa9a8207bc71095e6bd50f14cdc0ed8ec413d4ecc8260c45cb6f0796fffb625fcbb88233e569c179f35cc9a3882730810c777
-
SSDEEP
49152:rLLUi3Rx2dOh8Oy1OSlTlqblNDbD0wcY7mDGLQ:r33Rx2d4yASlTl2njcYycQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe -
Loads dropped DLL 2 IoCs
pid Process 3432 rundll32.exe 2520 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000_Classes\Local Settings ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1488 wrote to memory of 1264 1488 ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe 84 PID 1488 wrote to memory of 1264 1488 ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe 84 PID 1488 wrote to memory of 1264 1488 ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe 84 PID 1264 wrote to memory of 3432 1264 control.exe 86 PID 1264 wrote to memory of 3432 1264 control.exe 86 PID 1264 wrote to memory of 3432 1264 control.exe 86 PID 3432 wrote to memory of 1784 3432 rundll32.exe 94 PID 3432 wrote to memory of 1784 3432 rundll32.exe 94 PID 1784 wrote to memory of 2520 1784 RunDll32.exe 95 PID 1784 wrote to memory of 2520 1784 RunDll32.exe 95 PID 1784 wrote to memory of 2520 1784 RunDll32.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe"C:\Users\Admin\AppData\Local\Temp\ad7a72ce76aedde5a34f8e586ed4138be0a24a870f6f32e45ae3f9319d5fb476.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\3fv5b.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\3fv5b.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\3fv5b.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\3fv5b.CPL",5⤵
- Loads dropped DLL
PID:2520
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD546e52c1934680f078dc9c8d945891752
SHA142465cbb04b0f2c1d1858f5a3d1bb3174ad024dc
SHA25653ace6b74aff50bc422f5ca3362f58cb33ed24a8817acc5f09fdfe6a922d0213
SHA512367a0b960860e0aff56cc850590e5d49f348645977c8e99a4f5f2604edbd539b2ea9cee1ec8428f5ae5ebb25e0071783127400b9faa95d190dfbcd0bb45de524
-
Filesize
1.4MB
MD546e52c1934680f078dc9c8d945891752
SHA142465cbb04b0f2c1d1858f5a3d1bb3174ad024dc
SHA25653ace6b74aff50bc422f5ca3362f58cb33ed24a8817acc5f09fdfe6a922d0213
SHA512367a0b960860e0aff56cc850590e5d49f348645977c8e99a4f5f2604edbd539b2ea9cee1ec8428f5ae5ebb25e0071783127400b9faa95d190dfbcd0bb45de524
-
Filesize
1.4MB
MD546e52c1934680f078dc9c8d945891752
SHA142465cbb04b0f2c1d1858f5a3d1bb3174ad024dc
SHA25653ace6b74aff50bc422f5ca3362f58cb33ed24a8817acc5f09fdfe6a922d0213
SHA512367a0b960860e0aff56cc850590e5d49f348645977c8e99a4f5f2604edbd539b2ea9cee1ec8428f5ae5ebb25e0071783127400b9faa95d190dfbcd0bb45de524
-
Filesize
1.4MB
MD546e52c1934680f078dc9c8d945891752
SHA142465cbb04b0f2c1d1858f5a3d1bb3174ad024dc
SHA25653ace6b74aff50bc422f5ca3362f58cb33ed24a8817acc5f09fdfe6a922d0213
SHA512367a0b960860e0aff56cc850590e5d49f348645977c8e99a4f5f2604edbd539b2ea9cee1ec8428f5ae5ebb25e0071783127400b9faa95d190dfbcd0bb45de524