Analysis

  • max time kernel
    185s
  • max time network
    255s
  • platform
    windows10-1703_x64
  • resource
    win10-20231023-en
  • resource tags

    arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/11/2023, 04:54

General

  • Target

    55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe

  • Size

    1.6MB

  • MD5

    35fbac3e958db23a507743c48a9eca1b

  • SHA1

    d601934b380f4fb15926e2c36cea25fa3e0e65b3

  • SHA256

    55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d

  • SHA512

    8f9999c4d4be3da73268e14d0fb8c8d242c614678a0d2681581a865354457b3dfcfa1035983997d7979619014d2e5598277983c26ff65f3972d6ab7303f0f46d

  • SSDEEP

    49152:IS/GNzBzEODTfjy5QLWqBChDw+9KDDQKsp5YNxSdGQX:ISu5eOnfj2QZBqF9KkKsp55dGQX

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe
    "C:\Users\Admin\AppData\Local\Temp\55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\PpDHSyJ.cmd" "
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Windows\SysWOW64\control.exe
        "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl",
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:168
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl",
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:4272
          • C:\Windows\system32\RunDll32.exe
            C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl",
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3492
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl",
              6⤵
              • Loads dropped DLL
              PID:1380

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\PpDHSyJ.cmd

    Filesize

    93B

    MD5

    1d39b1caacf9e9594be27e498c9176f2

    SHA1

    03352961b32fa3787d428ea805873d11116bc04c

    SHA256

    8ccc62a79e959c503933dd8192a8bf16df44dd73bf3fdec06aed837e91262c57

    SHA512

    d72f7f3716fc482c4a28efbcd4650ca1a0dfd15355709673a7eef5363e28e01ef3cc66732c198fd2843a8df99faeaba33744749a950825d63ecf4d8eaa9cde93

  • C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl

    Filesize

    1.6MB

    MD5

    1ad5e0097a2b5c814351466f22d0b27d

    SHA1

    654811baecf6fbca4894ae8207b60960ad618977

    SHA256

    f4e696020869101eaff67f21d2ae71712799b1c44ea13c73a946754f679b47f9

    SHA512

    c51c8839235484b8ff4a575fe277d8662e4d93fba65a97ffc8742528a891aab2b7870d5b3e13324881e0a40b7d69c0f1049bdfe71f44d64e068cb157ea2e9273

  • \Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl

    Filesize

    1.6MB

    MD5

    1ad5e0097a2b5c814351466f22d0b27d

    SHA1

    654811baecf6fbca4894ae8207b60960ad618977

    SHA256

    f4e696020869101eaff67f21d2ae71712799b1c44ea13c73a946754f679b47f9

    SHA512

    c51c8839235484b8ff4a575fe277d8662e4d93fba65a97ffc8742528a891aab2b7870d5b3e13324881e0a40b7d69c0f1049bdfe71f44d64e068cb157ea2e9273

  • \Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl

    Filesize

    1.6MB

    MD5

    1ad5e0097a2b5c814351466f22d0b27d

    SHA1

    654811baecf6fbca4894ae8207b60960ad618977

    SHA256

    f4e696020869101eaff67f21d2ae71712799b1c44ea13c73a946754f679b47f9

    SHA512

    c51c8839235484b8ff4a575fe277d8662e4d93fba65a97ffc8742528a891aab2b7870d5b3e13324881e0a40b7d69c0f1049bdfe71f44d64e068cb157ea2e9273

  • memory/1380-27-0x0000000004AB0000-0x0000000004BBB000-memory.dmp

    Filesize

    1.0MB

  • memory/1380-26-0x0000000004AB0000-0x0000000004BBB000-memory.dmp

    Filesize

    1.0MB

  • memory/1380-23-0x0000000004AB0000-0x0000000004BBB000-memory.dmp

    Filesize

    1.0MB

  • memory/1380-22-0x0000000004980000-0x0000000004AA8000-memory.dmp

    Filesize

    1.2MB

  • memory/1380-19-0x0000000000BF0000-0x0000000000BF6000-memory.dmp

    Filesize

    24KB

  • memory/4272-10-0x0000000010000000-0x00000000101A6000-memory.dmp

    Filesize

    1.6MB

  • memory/4272-17-0x00000000056A0000-0x00000000057AB000-memory.dmp

    Filesize

    1.0MB

  • memory/4272-16-0x00000000056A0000-0x00000000057AB000-memory.dmp

    Filesize

    1.0MB

  • memory/4272-13-0x00000000056A0000-0x00000000057AB000-memory.dmp

    Filesize

    1.0MB

  • memory/4272-12-0x0000000005570000-0x0000000005698000-memory.dmp

    Filesize

    1.2MB

  • memory/4272-9-0x0000000004E80000-0x0000000004E86000-memory.dmp

    Filesize

    24KB