Analysis
-
max time kernel
90s -
max time network
202s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-11-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
FanControl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
FanControl.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
FanControl.exe
Resource
win11-20241007-en
General
-
Target
FanControl.exe
-
Size
1.3MB
-
MD5
9b94d3f94fae042147cbe5dc8009370f
-
SHA1
3116e6fa60f5cd0d580ff748d6ae0499e7534ff2
-
SHA256
6d99e5b8af7bd2312f7d3aa2e42514ceb40ed3203dfc669558e8d5d0879c724b
-
SHA512
1ee4b0a0d5a5eee964f20f875b6c0254086b4ac2925e47be64e943e4bff97be2b536ebb787dd9390160649ccda6a29f3134800901880458c407695186c5dab71
-
SSDEEP
6144:ny2M4ziRCIr+bDy/oUMs2p+pGv1xPGUD5p7aQNwul3k8+uiOiK6kU2SPSC5rII2e:ny2M/CIr+bG/oE2cI/uUjtNu/rf/3pP
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Modifies Control Panel 1 IoCs
Processes:
FanControl.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Control Panel\Colors FanControl.exe -
Modifies registry class 17 IoCs
Processes:
FanControl.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\FanControl.exe\" -ToastActivated" FanControl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\AppId = "{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}" FanControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452} FanControl.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe FanControl.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452} FanControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\LocalServer32 FanControl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\RunAs = "Interactive User" FanControl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\IconUri = "C:\\Users\\Admin\\AppData\\Local\\ToastNotificationManagerCompat\\Apps\\C48E82A6-F8B9-97B5-BC51-5BCDBF007452\\Icon.png" FanControl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\IconBackgroundColor = "FFDDDDDD" FanControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452} FanControl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\LocalServer32\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\FanControl.exe\" -ToastActivated" FanControl.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\Has7.0.1Fix = "1" FanControl.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\CLSID\{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}\LocalServer32 FanControl.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\CLSID FanControl.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\AppUserModelId FanControl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\DisplayName = "FanControl" FanControl.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\AppUserModelId\C:/Users/Admin/AppData/Local/Temp/FanControl.exe\CustomActivator = "{c48e82a6-f8b9-97b5-bc51-5bcdbf007452}" FanControl.exe -
Suspicious behavior: LoadsDriver 2 IoCs
Processes:
pid process 676 676 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
FanControl.exedescription pid process Token: SeDebugPrivilege 1408 FanControl.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
FanControl.exepid process 1408 FanControl.exe 1408 FanControl.exe 1408 FanControl.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
FanControl.exepid process 1408 FanControl.exe 1408 FanControl.exe 1408 FanControl.exe