Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09/06/2023, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe
Resource
win10-20230220-en
General
-
Target
6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe
-
Size
1.3MB
-
MD5
5fc776d0d26a9042d7b77310fcb6bdc9
-
SHA1
a1bbeb8c40799741e76f9b174a3da58028d4e916
-
SHA256
6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b
-
SHA512
80b24ac1b8f2ddf8dcd490dd20137617051508d9da7f98c6affad0abe5ffccc9d0c7f4c85a4909f0a64a37d032ce4e29dc8f50d4a1c7827f2547c11fc85b168a
-
SSDEEP
24576:gJr8tE+gHqtoDp1wnBz/R5HE/pvGqL+uB0NAJkbT3PQH546Y/qPrMw:gJ4NtoDzuBzp5kJFL+GmPQa6J
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 776 rundll32.exe 776 rundll32.exe 776 rundll32.exe 776 rundll32.exe 516 rundll32.exe 516 rundll32.exe 516 rundll32.exe 516 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1976 1292 6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe 27 PID 1292 wrote to memory of 1976 1292 6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe 27 PID 1292 wrote to memory of 1976 1292 6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe 27 PID 1292 wrote to memory of 1976 1292 6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe 27 PID 1976 wrote to memory of 776 1976 control.exe 28 PID 1976 wrote to memory of 776 1976 control.exe 28 PID 1976 wrote to memory of 776 1976 control.exe 28 PID 1976 wrote to memory of 776 1976 control.exe 28 PID 1976 wrote to memory of 776 1976 control.exe 28 PID 1976 wrote to memory of 776 1976 control.exe 28 PID 1976 wrote to memory of 776 1976 control.exe 28 PID 776 wrote to memory of 2036 776 rundll32.exe 29 PID 776 wrote to memory of 2036 776 rundll32.exe 29 PID 776 wrote to memory of 2036 776 rundll32.exe 29 PID 776 wrote to memory of 2036 776 rundll32.exe 29 PID 2036 wrote to memory of 516 2036 RunDll32.exe 30 PID 2036 wrote to memory of 516 2036 RunDll32.exe 30 PID 2036 wrote to memory of 516 2036 RunDll32.exe 30 PID 2036 wrote to memory of 516 2036 RunDll32.exe 30 PID 2036 wrote to memory of 516 2036 RunDll32.exe 30 PID 2036 wrote to memory of 516 2036 RunDll32.exe 30 PID 2036 wrote to memory of 516 2036 RunDll32.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe"C:\Users\Admin\AppData\Local\Temp\6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\TRNY7o.R2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\TRNY7o.R3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\TRNY7o.R4⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\TRNY7o.R5⤵
- Loads dropped DLL
PID:516
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c
-
Filesize
1.4MB
MD5cceb2a54607ca36f3bcc3ffbbdd0cdf4
SHA140f5605b3e4562d23ede5dbdc1a64d501630732b
SHA25627e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42
SHA512a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c