Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09/06/2023, 02:49

General

  • Target

    6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe

  • Size

    1.3MB

  • MD5

    5fc776d0d26a9042d7b77310fcb6bdc9

  • SHA1

    a1bbeb8c40799741e76f9b174a3da58028d4e916

  • SHA256

    6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b

  • SHA512

    80b24ac1b8f2ddf8dcd490dd20137617051508d9da7f98c6affad0abe5ffccc9d0c7f4c85a4909f0a64a37d032ce4e29dc8f50d4a1c7827f2547c11fc85b168a

  • SSDEEP

    24576:gJr8tE+gHqtoDp1wnBz/R5HE/pvGqL+uB0NAJkbT3PQH546Y/qPrMw:gJ4NtoDzuBzp5kJFL+GmPQa6J

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe
    "C:\Users\Admin\AppData\Local\Temp\6d6175076f8ed5d049c62a4f27a45aca438c041f157a31748904ed44fb552b3b.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\System32\control.exe" .\TRNY7o.R
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\TRNY7o.R
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:776
        • C:\Windows\system32\RunDll32.exe
          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\TRNY7o.R
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\TRNY7o.R
            5⤵
            • Loads dropped DLL
            PID:516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TRNY7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • \Users\Admin\AppData\Local\Temp\Trny7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • \Users\Admin\AppData\Local\Temp\Trny7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • \Users\Admin\AppData\Local\Temp\Trny7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • \Users\Admin\AppData\Local\Temp\Trny7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • \Users\Admin\AppData\Local\Temp\Trny7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • \Users\Admin\AppData\Local\Temp\Trny7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • \Users\Admin\AppData\Local\Temp\Trny7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • \Users\Admin\AppData\Local\Temp\Trny7o.R

    Filesize

    1.4MB

    MD5

    cceb2a54607ca36f3bcc3ffbbdd0cdf4

    SHA1

    40f5605b3e4562d23ede5dbdc1a64d501630732b

    SHA256

    27e39663bb0f4b8436a0769765d93a54f3cffd2773699a416af245822b10ae42

    SHA512

    a15b2442037d467059fa56c92d76413e3644d81cd5a2a92f79ca74c51f7e4ea68e39c5338286f51500c3378bae61b475ff32285be2ca5128321b5d835d0d602c

  • memory/516-66-0x0000000002230000-0x0000000002390000-memory.dmp

    Filesize

    1.4MB

  • memory/776-61-0x0000000001E30000-0x0000000001F90000-memory.dmp

    Filesize

    1.4MB