Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29-04-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral2
Sample
3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe
Resource
win11-20240419-en
General
-
Target
3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe
-
Size
2.3MB
-
MD5
6a040562b87075ae8b9c41a0e389d2d9
-
SHA1
92a437ad815ae3e21539a9bd5c9c75112db5c998
-
SHA256
3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9
-
SHA512
1f9ff4d22ca23ce1cb61c2f8178f6e15de9272b6819ef8983ae5a4b7405798c095f8aea39c0ef47540b436fb6179bb66701265ed4939f76637812950d14174ff
-
SSDEEP
49152:XcL4/TW35sOioJgVbgX1RWZ8dLE7dJPx9PHhTgtgtX4b6nccK:XcL445v+cXeZELcdLFH0CQ2ccK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation 3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe -
Loads dropped DLL 2 IoCs
pid Process 5004 rundll32.exe 2688 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000_Classes\Local Settings 3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4160 wrote to memory of 1128 4160 3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe 84 PID 4160 wrote to memory of 1128 4160 3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe 84 PID 4160 wrote to memory of 1128 4160 3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe 84 PID 1128 wrote to memory of 5004 1128 control.exe 86 PID 1128 wrote to memory of 5004 1128 control.exe 86 PID 1128 wrote to memory of 5004 1128 control.exe 86 PID 5004 wrote to memory of 4940 5004 rundll32.exe 94 PID 5004 wrote to memory of 4940 5004 rundll32.exe 94 PID 4940 wrote to memory of 2688 4940 RunDll32.exe 95 PID 4940 wrote to memory of 2688 4940 RunDll32.exe 95 PID 4940 wrote to memory of 2688 4940 RunDll32.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe"C:\Users\Admin\AppData\Local\Temp\3adf9a6f35557d2303758bbebab8570d79a1e8b7e9abe7cc2688afbf5b360dc9.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\0Mr4Dz.cPl",2⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0Mr4Dz.cPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\0Mr4Dz.cPl",4⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\0Mr4Dz.cPl",5⤵
- Loads dropped DLL
PID:2688
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5d3c47af0e632fd977b33d4f5b09b3347
SHA1e581523b289f9e533efe83417e2c1f33f08037a2
SHA25638b5f0f67d791f0fe953c180f99c8f5a2aa3d996e2054fad64e0f9acfd2c1c67
SHA512b506162062b5b5df9952fd372138a42d9e30afb77b7377abb0b6ce91217b2a3f874668eca1375ca696e0ed8bb6628dbfa25410e2c90ed4cfc63c3f479d238b51