Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
0fe4857aff6f670e37930746eaf9dc06.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0fe4857aff6f670e37930746eaf9dc06.exe
Resource
win10v2004-20231215-en
General
-
Target
0fe4857aff6f670e37930746eaf9dc06.exe
-
Size
592KB
-
MD5
0fe4857aff6f670e37930746eaf9dc06
-
SHA1
d865fa31c6bc0157106bebe9aad049469dc5db56
-
SHA256
b8fd869fe2e52eed5fd49f87271c51e616ad3bb58205adcf44b6b248501e05b5
-
SHA512
a7dd640da309f8714f5f054be6f9893522ec8b552f768d194b3ebfc1c3d559a19af12541db182ca47b351a9e33b93fb08e908cff220fd320133dbaf16b6a945d
-
SSDEEP
12288:WAHUM0Od8OnlGf/v2Lz8+dwE05azzsXqcEuqi3MIrtsWF/wSHw7Eq9GJFt:WAHUM0OdlGnveLdwZqzsacEVwPFX3J
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 6 2712 rundll32.exe -
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 14 IoCs
pid Process 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 1740 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe 2712 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctlmgr.dll_xserve = "rundll32.exe \"C:\\Windows\\SysWOW64\\ctlmgr.dll\",xserve" rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\ctlmgr.dll 0fe4857aff6f670e37930746eaf9dc06.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe 2524 rundll32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1740 2336 0fe4857aff6f670e37930746eaf9dc06.exe 3 PID 2336 wrote to memory of 1740 2336 0fe4857aff6f670e37930746eaf9dc06.exe 3 PID 2336 wrote to memory of 1740 2336 0fe4857aff6f670e37930746eaf9dc06.exe 3 PID 2336 wrote to memory of 1740 2336 0fe4857aff6f670e37930746eaf9dc06.exe 3 PID 2336 wrote to memory of 1740 2336 0fe4857aff6f670e37930746eaf9dc06.exe 3 PID 2336 wrote to memory of 1740 2336 0fe4857aff6f670e37930746eaf9dc06.exe 3 PID 2336 wrote to memory of 1740 2336 0fe4857aff6f670e37930746eaf9dc06.exe 3 PID 1740 wrote to memory of 2524 1740 rundll32.exe 2 PID 1740 wrote to memory of 2524 1740 rundll32.exe 2 PID 1740 wrote to memory of 2524 1740 rundll32.exe 2 PID 1740 wrote to memory of 2524 1740 rundll32.exe 2 PID 1740 wrote to memory of 2524 1740 rundll32.exe 2 PID 1740 wrote to memory of 2524 1740 rundll32.exe 2 PID 1740 wrote to memory of 2524 1740 rundll32.exe 2 PID 1740 wrote to memory of 2712 1740 rundll32.exe 1 PID 1740 wrote to memory of 2712 1740 rundll32.exe 1 PID 1740 wrote to memory of 2712 1740 rundll32.exe 1 PID 1740 wrote to memory of 2712 1740 rundll32.exe 1 PID 1740 wrote to memory of 2712 1740 rundll32.exe 1 PID 1740 wrote to memory of 2712 1740 rundll32.exe 1 PID 1740 wrote to memory of 2712 1740 rundll32.exe 1
Processes
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\ctlmgr.dll",xserve1⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2712
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\ctlmgr.dll",watch1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Windows\system32\ctlmgr.dll",install1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740
-
C:\Users\Admin\AppData\Local\Temp\0fe4857aff6f670e37930746eaf9dc06.exe"C:\Users\Admin\AppData\Local\Temp\0fe4857aff6f670e37930746eaf9dc06.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5a468eb42c1f99ecf8e6ca64e1451095f
SHA180ec76b2b785143022206edc9004a45bb0ea1ec4
SHA25650e48a5e581536554642793d283ac77ac1aaca49864591c79b0881db9101729b
SHA51223f0ecf26e4d56b1cd43379bd009eb688d76b85731ef219e4e1cfd8a4dae87735940dca4b831c4f2f6599daf0137bdfdabaa538fc5b27e6114f2c721f2e7d73d