Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe
Resource
win10v2004-20231215-en
General
-
Target
3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe
-
Size
2.0MB
-
MD5
75dec2cd433400145dbd3211c6ad34ee
-
SHA1
016e812aa0dfaa383e5bf82e3eb820b4260b2fc7
-
SHA256
3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13
-
SHA512
bcf09159928335c1f3844953f34e32d3314496fd5a41fb9912ce6b258bd87924b29d13fd3312aa0d80d5c6e89595e4e265f35960f87d5aa4e1a1c817bf13dc89
-
SSDEEP
49152:anGImU6mVe0sxttXGKPipSMNPHkzoVBVR4Qee:aGI6mVKXnPbMNP1BVqRe
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2780 rundll32.exe 2780 rundll32.exe 2780 rundll32.exe 2780 rundll32.exe 2656 rundll32.exe 2656 rundll32.exe 2656 rundll32.exe 2656 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2720 3012 3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe 28 PID 3012 wrote to memory of 2720 3012 3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe 28 PID 3012 wrote to memory of 2720 3012 3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe 28 PID 3012 wrote to memory of 2720 3012 3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe 28 PID 2720 wrote to memory of 2780 2720 control.exe 29 PID 2720 wrote to memory of 2780 2720 control.exe 29 PID 2720 wrote to memory of 2780 2720 control.exe 29 PID 2720 wrote to memory of 2780 2720 control.exe 29 PID 2720 wrote to memory of 2780 2720 control.exe 29 PID 2720 wrote to memory of 2780 2720 control.exe 29 PID 2720 wrote to memory of 2780 2720 control.exe 29 PID 2780 wrote to memory of 3024 2780 rundll32.exe 33 PID 2780 wrote to memory of 3024 2780 rundll32.exe 33 PID 2780 wrote to memory of 3024 2780 rundll32.exe 33 PID 2780 wrote to memory of 3024 2780 rundll32.exe 33 PID 3024 wrote to memory of 2656 3024 RunDll32.exe 32 PID 3024 wrote to memory of 2656 3024 RunDll32.exe 32 PID 3024 wrote to memory of 2656 3024 RunDll32.exe 32 PID 3024 wrote to memory of 2656 3024 RunDll32.exe 32 PID 3024 wrote to memory of 2656 3024 RunDll32.exe 32 PID 3024 wrote to memory of 2656 3024 RunDll32.exe 32 PID 3024 wrote to memory of 2656 3024 RunDll32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe"C:\Users\Admin\AppData\Local\Temp\3c92b98879a595e47fc6280e906c190b9b029de7a0b0c189fdec319b07b8bd13.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\HpFkcO.Cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HpFkcO.Cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\HpFkcO.Cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:3024
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\HpFkcO.Cpl",1⤵
- Loads dropped DLL
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321KB
MD56f76a6bfae69e0f7ce8b68a5ee4bb9a7
SHA1f5957b600370b8214925cdd9038b033b5ad83cfd
SHA256b91247b021687226a4ce585cb8fc196714144f68610479a06d91eb6dafc63f8c
SHA512ad809531086e2eacd3bff8580c5e4b87217085992b172cad712d2a2f5b74cfc672ac16a99f07a902afa21e3ab3cca269b47519caf0ef171914fd790008a11a26
-
Filesize
56KB
MD50480373ece67119c2decf87911dae719
SHA13b42c974c6b9fe87112228a7cfae1a914a5dcb93
SHA25697c6576e10efefd0ded73a9e6baae2ba8310143e1c420f9c3533ba8c2468312c
SHA512aeb33dfd412a50d11a75ca45afd5d8cd82e55b547be34d1fdd9d69a060cd0e7ed2823f192bd132592a5101c479124edbc86dbed383dde38e03eb6ec0cb5398b3
-
Filesize
33KB
MD5b5293dd85a63d4b70a44c81bb4511843
SHA11205519a3d4a376b8ce342e7258a95c20411caf8
SHA256218d7da9132944e6cab2f81933f63904ad12c2faf7100b10cb76f35f6edf33b6
SHA512b218425284e9922c840ae82d421eb7d7b0922a389efa6169b30121c056b951cf57c87d8eb0f235b253040fdfc4bf04b72f20bac8783694de331b31955212353d
-
Filesize
31KB
MD5dcae3d7aeee45d4d463c587dfce02530
SHA1ce3b4f3572fed1515ce30487a51a8b89d41e0b88
SHA2567548455c4d99ecfea84ba1ad1b30b6301560aa207b404d5930c0dee55225cf59
SHA51239fd8d6103f851d19b6110dd03f2f0736f51e472d7a5c45a6b001b273fac9ad4cb002cfcad9b9ad9000069494e9b7688d2871ea3995ef9e976fc213ff46ebeb2
-
Filesize
56KB
MD5efc6533456526674db445010b1cbf6b5
SHA162a9feebe7723d8436179568167e0152fcad4734
SHA256421265dd7ce5a84b88a75cd3c7a43e2aa705ef8b5da083a1346463593a5632b7
SHA51260ee9d51e922d5f6ac7d713995866e4ca46b4583319231c1a0fc22bffcdacd054428c6cc9d84bc16ba8b22bea0326de73add102ed273c46f784a3ad36eccf16e
-
Filesize
585KB
MD5ba1b294b7dafde3774e690d07e53fbaf
SHA1126cebabc69297c75b9eaf3bd58c9ba7e63e461f
SHA256d6fde5dbbd2d2ea19e14b232ad2495dbc36efb5a639a44630e94ea92022d0360
SHA5127d6c0a7b0a638a085ee67110e607cf4147a7afd9a956699f679565b8ebb46ebb9326abed7f21ad788b8d19c3df05364adcd952a7a67f57432f2d55685555fbbf
-
Filesize
825KB
MD57a217247c7f26b200573cd97d39a4195
SHA18ddeec3e1e8264f6650439b7a0799353f54628bc
SHA256e28db3d4d0152ed9abe1c578d93497b709fbd624bec8fac8b83460dfa1f65fff
SHA512e51808e5857195ef872c34585e820900fb32765a15c00a3dc0c493a2b9fdc44dee7221fb86de4345493659e11fc7cfb594bb8965127192ec75996058e8d39c7e
-
Filesize
660KB
MD542c0a17a75c8ce7d280c565e4cad4e3e
SHA196e7c507fa7796d9b61d679a9a535267ccae92b7
SHA25652b9b2278774db4d8df0422b2357d10635ac225a87a8448134e35ebc28e893e7
SHA51287397cdbe20bda978544669b21af9d7fd92c84de64d4c4a7564f94713d71c648dda7ce9e41674b08e35e87a58ba33e645a8f42dcd69c44cb61d1f5ded5315f4c
-
Filesize
678KB
MD5cd0b14d5ae1858452124e91804ffbe68
SHA1431c24a4fe3be6d94ed8f6fd95c3049917a2450d
SHA2561e0dd2c3c86669e24f673d54568bc869ae86addad8689a06edfadff4e634211a
SHA51224adf5d3c43f5d7af2f67a36f05ca41de00a74016e3ceaec79748d41a36912d658c024c93088e48c7c91a6c7ce2df519071d79c5ee9d13a4db8776c7002a716b