Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
10-01-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
parentalcontrolsetup.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
parentalcontrolsetup.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
新云软件.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
新云软件.url
Resource
win10v2004-20231222-en
General
-
Target
parentalcontrolsetup.exe
-
Size
1.9MB
-
MD5
7a62bce2d731b737ad61473d6f0815f8
-
SHA1
e315a87a4e8145bd919eed8d633bdc8f8a1d5010
-
SHA256
a4e0bc3a14238d5fd855a652492d3282edbe67241b9649ef1a649fea66694e75
-
SHA512
6ac22bf005991d7cb307b4c021a27d7d4e5e4b293e2ad83701c8ed3007157cc959555980fbb529ef2274d0c41650672c63f48edc0de7d0c47c48e43b3e4dbcb0
-
SSDEEP
49152:76dFTbyCiKE/RPcWSwW5fkA5sYcOWLI9KVjMoC2UalwVbv4e:edFT2CcpPcWSwW5fZsYcOS5ZC2DKVb1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2412 is-05R8E.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2412 1548 parentalcontrolsetup.exe 76 PID 1548 wrote to memory of 2412 1548 parentalcontrolsetup.exe 76 PID 1548 wrote to memory of 2412 1548 parentalcontrolsetup.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\parentalcontrolsetup.exe"C:\Users\Admin\AppData\Local\Temp\parentalcontrolsetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\is-8265B.tmp\is-05R8E.tmp"C:\Users\Admin\AppData\Local\Temp\is-8265B.tmp\is-05R8E.tmp" /SL4 $501C6 "C:\Users\Admin\AppData\Local\Temp\parentalcontrolsetup.exe" 1719399 522242⤵
- Executes dropped EXE
PID:2412
-