Analysis
-
max time kernel
185s -
max time network
255s -
platform
windows10-1703_x64 -
resource
win10-20231023-en -
resource tags
arch:x64arch:x86image:win10-20231023-enlocale:en-usos:windows10-1703-x64system -
submitted
27/11/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe
Resource
win10-20231023-en
General
-
Target
55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe
-
Size
1.6MB
-
MD5
35fbac3e958db23a507743c48a9eca1b
-
SHA1
d601934b380f4fb15926e2c36cea25fa3e0e65b3
-
SHA256
55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d
-
SHA512
8f9999c4d4be3da73268e14d0fb8c8d242c614678a0d2681581a865354457b3dfcfa1035983997d7979619014d2e5598277983c26ff65f3972d6ab7303f0f46d
-
SSDEEP
49152:IS/GNzBzEODTfjy5QLWqBChDw+9KDDQKsp5YNxSdGQX:ISu5eOnfj2QZBqF9KkKsp55dGQX
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4272 rundll32.exe 1380 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2184424523-918736138-622003966-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4112 wrote to memory of 1836 4112 55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe 71 PID 4112 wrote to memory of 1836 4112 55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe 71 PID 4112 wrote to memory of 1836 4112 55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe 71 PID 1836 wrote to memory of 168 1836 cmd.exe 74 PID 1836 wrote to memory of 168 1836 cmd.exe 74 PID 1836 wrote to memory of 168 1836 cmd.exe 74 PID 168 wrote to memory of 4272 168 control.exe 75 PID 168 wrote to memory of 4272 168 control.exe 75 PID 168 wrote to memory of 4272 168 control.exe 75 PID 4272 wrote to memory of 3492 4272 rundll32.exe 76 PID 4272 wrote to memory of 3492 4272 rundll32.exe 76 PID 3492 wrote to memory of 1380 3492 RunDll32.exe 77 PID 3492 wrote to memory of 1380 3492 RunDll32.exe 77 PID 3492 wrote to memory of 1380 3492 RunDll32.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe"C:\Users\Admin\AppData\Local\Temp\55f9862c38d3b8754a72ea2f501eef9284ca47ff5512797fd93c307617092d5d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\PpDHSyJ.cmd" "2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl",3⤵
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl",4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl",5⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7z7D1AB010\sNSy0.Cpl",6⤵
- Loads dropped DLL
PID:1380
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93B
MD51d39b1caacf9e9594be27e498c9176f2
SHA103352961b32fa3787d428ea805873d11116bc04c
SHA2568ccc62a79e959c503933dd8192a8bf16df44dd73bf3fdec06aed837e91262c57
SHA512d72f7f3716fc482c4a28efbcd4650ca1a0dfd15355709673a7eef5363e28e01ef3cc66732c198fd2843a8df99faeaba33744749a950825d63ecf4d8eaa9cde93
-
Filesize
1.6MB
MD51ad5e0097a2b5c814351466f22d0b27d
SHA1654811baecf6fbca4894ae8207b60960ad618977
SHA256f4e696020869101eaff67f21d2ae71712799b1c44ea13c73a946754f679b47f9
SHA512c51c8839235484b8ff4a575fe277d8662e4d93fba65a97ffc8742528a891aab2b7870d5b3e13324881e0a40b7d69c0f1049bdfe71f44d64e068cb157ea2e9273
-
Filesize
1.6MB
MD51ad5e0097a2b5c814351466f22d0b27d
SHA1654811baecf6fbca4894ae8207b60960ad618977
SHA256f4e696020869101eaff67f21d2ae71712799b1c44ea13c73a946754f679b47f9
SHA512c51c8839235484b8ff4a575fe277d8662e4d93fba65a97ffc8742528a891aab2b7870d5b3e13324881e0a40b7d69c0f1049bdfe71f44d64e068cb157ea2e9273
-
Filesize
1.6MB
MD51ad5e0097a2b5c814351466f22d0b27d
SHA1654811baecf6fbca4894ae8207b60960ad618977
SHA256f4e696020869101eaff67f21d2ae71712799b1c44ea13c73a946754f679b47f9
SHA512c51c8839235484b8ff4a575fe277d8662e4d93fba65a97ffc8742528a891aab2b7870d5b3e13324881e0a40b7d69c0f1049bdfe71f44d64e068cb157ea2e9273