Analysis
-
max time kernel
63s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/06/2023, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61.exe
Resource
win10-20230220-en
General
-
Target
735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61.exe
-
Size
1.3MB
-
MD5
ce0d530cf1542b59146139dcc0cf1adf
-
SHA1
f8055197b2de0b280a71716adce193eec4871df0
-
SHA256
735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61
-
SHA512
93c7465edb3aa5891e0c0a8d56ebf33590042e04ea751575f978b34e3b0a73a0b626d390bba8fc90c8e464b27504b27e975e32a1af715d5770cf77f50d2dd51a
-
SSDEEP
24576:YLeTtjJFtHrKfFrEiYMTmO8bQe19bhvn0t9PU4p4E/STFs1vyxFpkRep:YLYkfVE2KOwH19tqeirSF9FpaO
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 4608 rundll32.exe 4608 rundll32.exe 1636 rundll32.exe 1636 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3648 wrote to memory of 3476 3648 735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61.exe 66 PID 3648 wrote to memory of 3476 3648 735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61.exe 66 PID 3648 wrote to memory of 3476 3648 735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61.exe 66 PID 3476 wrote to memory of 4608 3476 control.exe 67 PID 3476 wrote to memory of 4608 3476 control.exe 67 PID 3476 wrote to memory of 4608 3476 control.exe 67 PID 4608 wrote to memory of 2056 4608 rundll32.exe 68 PID 4608 wrote to memory of 2056 4608 rundll32.exe 68 PID 2056 wrote to memory of 1636 2056 RunDll32.exe 69 PID 2056 wrote to memory of 1636 2056 RunDll32.exe 69 PID 2056 wrote to memory of 1636 2056 RunDll32.exe 69
Processes
-
C:\Users\Admin\AppData\Local\Temp\735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61.exe"C:\Users\Admin\AppData\Local\Temp\735d979fa7788f08f1f01c180f7ca0c4cd7bcbce122a511bcd2375be99304b61.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" .\NBCD.9Jb2⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\NBCD.9Jb3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\NBCD.9Jb4⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\NBCD.9Jb5⤵
- Loads dropped DLL
PID:1636
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5c6fd7199391cf051c70370bc257601c8
SHA1de146643cbadbefa6fab80efd11e9a47e0776246
SHA256b49320e8c877ca855b9d725e90e46813fb65c666d2ffb3f730bb610c5e5d206a
SHA5129ced521d9d9326c5821c81efc92d7f0056c868ec4e97eb80f56aa46d3e2053436188dad803cea2fc6643fdf1caa2b54efeeeb1cd3a421300d20b28f1e9ad6b0e
-
Filesize
1.4MB
MD5c6fd7199391cf051c70370bc257601c8
SHA1de146643cbadbefa6fab80efd11e9a47e0776246
SHA256b49320e8c877ca855b9d725e90e46813fb65c666d2ffb3f730bb610c5e5d206a
SHA5129ced521d9d9326c5821c81efc92d7f0056c868ec4e97eb80f56aa46d3e2053436188dad803cea2fc6643fdf1caa2b54efeeeb1cd3a421300d20b28f1e9ad6b0e
-
Filesize
1.4MB
MD5c6fd7199391cf051c70370bc257601c8
SHA1de146643cbadbefa6fab80efd11e9a47e0776246
SHA256b49320e8c877ca855b9d725e90e46813fb65c666d2ffb3f730bb610c5e5d206a
SHA5129ced521d9d9326c5821c81efc92d7f0056c868ec4e97eb80f56aa46d3e2053436188dad803cea2fc6643fdf1caa2b54efeeeb1cd3a421300d20b28f1e9ad6b0e
-
Filesize
1.4MB
MD5c6fd7199391cf051c70370bc257601c8
SHA1de146643cbadbefa6fab80efd11e9a47e0776246
SHA256b49320e8c877ca855b9d725e90e46813fb65c666d2ffb3f730bb610c5e5d206a
SHA5129ced521d9d9326c5821c81efc92d7f0056c868ec4e97eb80f56aa46d3e2053436188dad803cea2fc6643fdf1caa2b54efeeeb1cd3a421300d20b28f1e9ad6b0e
-
Filesize
1.4MB
MD5c6fd7199391cf051c70370bc257601c8
SHA1de146643cbadbefa6fab80efd11e9a47e0776246
SHA256b49320e8c877ca855b9d725e90e46813fb65c666d2ffb3f730bb610c5e5d206a
SHA5129ced521d9d9326c5821c81efc92d7f0056c868ec4e97eb80f56aa46d3e2053436188dad803cea2fc6643fdf1caa2b54efeeeb1cd3a421300d20b28f1e9ad6b0e