Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 05:22

General

  • Target

    0fe4857aff6f670e37930746eaf9dc06.exe

  • Size

    592KB

  • MD5

    0fe4857aff6f670e37930746eaf9dc06

  • SHA1

    d865fa31c6bc0157106bebe9aad049469dc5db56

  • SHA256

    b8fd869fe2e52eed5fd49f87271c51e616ad3bb58205adcf44b6b248501e05b5

  • SHA512

    a7dd640da309f8714f5f054be6f9893522ec8b552f768d194b3ebfc1c3d559a19af12541db182ca47b351a9e33b93fb08e908cff220fd320133dbaf16b6a945d

  • SSDEEP

    12288:WAHUM0Od8OnlGf/v2Lz8+dwE05azzsXqcEuqi3MIrtsWF/wSHw7Eq9GJFt:WAHUM0OdlGnveLdwZqzsacEVwPFX3J

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Loads dropped DLL 14 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\SysWOW64\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\system32\ctlmgr.dll",xserve
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    PID:2712
  • C:\Windows\SysWOW64\rundll32.exe
    "C:\Windows\System32\rundll32.exe" "C:\Windows\system32\ctlmgr.dll",watch
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:2524
  • C:\Windows\SysWOW64\rundll32.exe
    rundll32.exe "C:\Windows\system32\ctlmgr.dll",install
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1740
  • C:\Users\Admin\AppData\Local\Temp\0fe4857aff6f670e37930746eaf9dc06.exe
    "C:\Users\Admin\AppData\Local\Temp\0fe4857aff6f670e37930746eaf9dc06.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:2336

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\ctlmgr.dll

    Filesize

    477KB

    MD5

    a468eb42c1f99ecf8e6ca64e1451095f

    SHA1

    80ec76b2b785143022206edc9004a45bb0ea1ec4

    SHA256

    50e48a5e581536554642793d283ac77ac1aaca49864591c79b0881db9101729b

    SHA512

    23f0ecf26e4d56b1cd43379bd009eb688d76b85731ef219e4e1cfd8a4dae87735940dca4b831c4f2f6599daf0137bdfdabaa538fc5b27e6114f2c721f2e7d73d

  • memory/1740-9-0x0000000074E00000-0x0000000074F07000-memory.dmp

    Filesize

    1.0MB

  • memory/1740-8-0x00000000006C0000-0x00000000007C0000-memory.dmp

    Filesize

    1024KB

  • memory/2336-43-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2336-0-0x0000000000400000-0x0000000000496000-memory.dmp

    Filesize

    600KB

  • memory/2336-1-0x0000000000220000-0x0000000000320000-memory.dmp

    Filesize

    1024KB

  • memory/2524-46-0x0000000074E00000-0x0000000074F07000-memory.dmp

    Filesize

    1.0MB

  • memory/2524-14-0x00000000002B0000-0x00000000003B0000-memory.dmp

    Filesize

    1024KB

  • memory/2524-23-0x0000000002010000-0x0000000002110000-memory.dmp

    Filesize

    1024KB

  • memory/2524-24-0x00000000009B0000-0x0000000000AB7000-memory.dmp

    Filesize

    1.0MB

  • memory/2524-47-0x00000000009B0000-0x0000000000AB7000-memory.dmp

    Filesize

    1.0MB

  • memory/2524-52-0x0000000002010000-0x0000000002110000-memory.dmp

    Filesize

    1024KB

  • memory/2712-29-0x0000000000670000-0x0000000000770000-memory.dmp

    Filesize

    1024KB

  • memory/2712-38-0x0000000000850000-0x0000000000957000-memory.dmp

    Filesize

    1.0MB

  • memory/2712-39-0x0000000001F80000-0x0000000002080000-memory.dmp

    Filesize

    1024KB

  • memory/2712-48-0x0000000074E00000-0x0000000074F07000-memory.dmp

    Filesize

    1.0MB

  • memory/2712-49-0x0000000000850000-0x0000000000957000-memory.dmp

    Filesize

    1.0MB

  • memory/2712-55-0x0000000000670000-0x0000000000770000-memory.dmp

    Filesize

    1024KB

  • memory/2712-56-0x0000000001F80000-0x0000000002080000-memory.dmp

    Filesize

    1024KB