Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 04:45

General

  • Target

    0eeed44054b5b220fb5954c4b7dceab0.exe

  • Size

    136KB

  • MD5

    0eeed44054b5b220fb5954c4b7dceab0

  • SHA1

    a4f4e3ed6f830b670398e3bfb459b6208e4e11f1

  • SHA256

    57bdeafeb3f41622728d124abcf037e3b59cf864b810eb07c8aa0e3283704422

  • SHA512

    8025375c9611ed369978df0d0e6cb2ff3385ee5ca603dc219240d25e0dcc9628193ec2821d7753b13c54e50febf794e3057ec27000bac7ddf4c2f57fdac144f9

  • SSDEEP

    3072:8Uj3Wn3UqbkzrIE5RMiLdcjd5U+da+IbSudg:8UjjrbrTctdp1uW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0eeed44054b5b220fb5954c4b7dceab0.exe
    "C:\Users\Admin\AppData\Local\Temp\0eeed44054b5b220fb5954c4b7dceab0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\0eeed44054b5b220fb5954c4b7dceab0.bat
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\SysWOW64\control.exe
        "C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\3112232112.cpl",
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2340
  • C:\Windows\SysWOW64\rundll32.exe
    "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\3112232112.cpl",
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:4576
    • C:\Windows\system32\RunDll32.exe
      C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\3112232112.cpl",
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1896
  • C:\Windows\SysWOW64\rundll32.exe
    "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\3112232112.cpl",
    1⤵
    • Loads dropped DLL
    PID:3792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3112232112.cpl

    Filesize

    85KB

    MD5

    3c1fad291b617b00b9d190cdfcc57698

    SHA1

    3e1929d373b904d76f6b2fa5f9c50c2e957d1607

    SHA256

    1e5078c275042e6335ab237e181aea1ea4e29538456c4dcfea61702fb4b299ba

    SHA512

    9eb520fea3004b58dd45f69ee4cc44955051b203cd7244cb69fc4bd699eaac0c3f7bb7a5282ac58311212dee805294874f96ea942b679052a2f151afad97c344

  • memory/2484-0-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2484-5-0x0000000000400000-0x0000000000426000-memory.dmp

    Filesize

    152KB

  • memory/2484-1-0x00000000006A0000-0x00000000006A2000-memory.dmp

    Filesize

    8KB

  • memory/3792-16-0x0000000000930000-0x000000000096F000-memory.dmp

    Filesize

    252KB

  • memory/3792-18-0x0000000000970000-0x0000000000972000-memory.dmp

    Filesize

    8KB

  • memory/3792-17-0x0000000000930000-0x000000000096F000-memory.dmp

    Filesize

    252KB

  • memory/4576-9-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/4576-10-0x0000000002D00000-0x0000000002D02000-memory.dmp

    Filesize

    8KB