Analysis
-
max time kernel
210s -
max time network
209s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-11-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
FanControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
FanControl.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
FanControl.exe
Resource
win11-20241007-en
General
-
Target
FanControl.exe
-
Size
1.3MB
-
MD5
9b94d3f94fae042147cbe5dc8009370f
-
SHA1
3116e6fa60f5cd0d580ff748d6ae0499e7534ff2
-
SHA256
6d99e5b8af7bd2312f7d3aa2e42514ceb40ed3203dfc669558e8d5d0879c724b
-
SHA512
1ee4b0a0d5a5eee964f20f875b6c0254086b4ac2925e47be64e943e4bff97be2b536ebb787dd9390160649ccda6a29f3134800901880458c407695186c5dab71
-
SSDEEP
6144:ny2M4ziRCIr+bDy/oUMs2p+pGv1xPGUD5p7aQNwul3k8+uiOiK6kU2SPSC5rII2e:ny2M/CIr+bG/oE2cI/uUjtNu/rf/3pP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
FanControl.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\International\Geo\Nation FanControl.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Modifies Control Panel 1 IoCs
Processes:
FanControl.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000\Control Panel\Colors FanControl.exe -
Modifies registry class 17 IoCs
Processes:
FanControl.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\DisplayName = "FanControl" FanControl.exe Set value (int) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\Has7.0.1Fix = "1" FanControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\LocalServer32 FanControl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\AppId = "{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}" FanControl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\RunAs = "Interactive User" FanControl.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe FanControl.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\AppUserModelId FanControl.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\LocalServer32 FanControl.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\CLSID FanControl.exe Key created \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452} FanControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452} FanControl.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\IconUri = "C:\\Users\\Admin\\AppData\\Local\\ToastNotificationManagerCompat\\Apps\\C48E82A6-F8B9-97B5-BC51-5BCDBF007452\\Icon.png" FanControl.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\IconBackgroundColor = "FFDDDDDD" FanControl.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\CustomActivator = "{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}" FanControl.exe Set value (str) \REGISTRY\USER\S-1-5-21-870806430-2618236806-3023919190-1000_Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\FanControl.exe\" -ToastActivated" FanControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452} FanControl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\FanControl.exe\" -ToastActivated" FanControl.exe -
Suspicious behavior: LoadsDriver 4 IoCs
Processes:
pid process 680 680 680 680 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
FanControl.exedescription pid process Token: SeDebugPrivilege 1984 FanControl.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
FanControl.exepid process 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe -
Suspicious use of SendNotifyMessage 9 IoCs
Processes:
FanControl.exepid process 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe 1984 FanControl.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\FanControl.exe"C:\Users\Admin\AppData\Local\Temp\FanControl.exe"1⤵
- Checks computer location settings
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD502c5a6e51c24360e0f3d6d385999981c
SHA1a7400fac953d93ec25cac6452af824941e83052e
SHA25663a0ccd10f5ac73ef2b19d91b8d282ac7da6e413f40cb17ef6f1e6289b11ff69
SHA5123bf4e5cfbcb54436760cd5ecc113b25ab79e89374ae8af42305ca59deb9d0d79b77b985668447e1670d85bda0891a166a790e91b6d360516ac8329ac62950ab6