Analysis
-
max time kernel
86s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
30/06/2023, 12:30
Static task
static1
Behavioral task
behavioral1
Sample
data64_6.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
data64_6.exe
Resource
win10v2004-20230621-en
General
-
Target
data64_6.exe
-
Size
1.9MB
-
MD5
182baf929b35d5d63747617d2007c77a
-
SHA1
0dfe91ab115ed862b48b1e4006a44e86c33eb772
-
SHA256
582150ba4379122253eeb2a1a7ace968394ee7e566f0d0d794f6ba7d937037d5
-
SHA512
55bab5bbec04389f94f297843f7fcb4d71173c8f1f6e5007b6a2eaf5d937f50f9b2d9f61f983c86b20d342a4a4cb6691e23c3a0322575c826d23b55ee61a19f7
-
SSDEEP
49152:084cMQyRcf9HmjMbS4b08WrjXM6pzM6MGaU9PPIbnllyuA:6cMQyW9GX4MXBGyZPynXyB
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2024 rundll32.exe 2024 rundll32.exe 2024 rundll32.exe 2024 rundll32.exe 1432 rundll32.exe 1432 rundll32.exe 1432 rundll32.exe 1432 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1200 wrote to memory of 852 1200 data64_6.exe 28 PID 1200 wrote to memory of 852 1200 data64_6.exe 28 PID 1200 wrote to memory of 852 1200 data64_6.exe 28 PID 1200 wrote to memory of 852 1200 data64_6.exe 28 PID 852 wrote to memory of 2024 852 control.exe 29 PID 852 wrote to memory of 2024 852 control.exe 29 PID 852 wrote to memory of 2024 852 control.exe 29 PID 852 wrote to memory of 2024 852 control.exe 29 PID 852 wrote to memory of 2024 852 control.exe 29 PID 852 wrote to memory of 2024 852 control.exe 29 PID 852 wrote to memory of 2024 852 control.exe 29 PID 2024 wrote to memory of 668 2024 rundll32.exe 30 PID 2024 wrote to memory of 668 2024 rundll32.exe 30 PID 2024 wrote to memory of 668 2024 rundll32.exe 30 PID 2024 wrote to memory of 668 2024 rundll32.exe 30 PID 668 wrote to memory of 1432 668 RunDll32.exe 31 PID 668 wrote to memory of 1432 668 RunDll32.exe 31 PID 668 wrote to memory of 1432 668 RunDll32.exe 31 PID 668 wrote to memory of 1432 668 RunDll32.exe 31 PID 668 wrote to memory of 1432 668 RunDll32.exe 31 PID 668 wrote to memory of 1432 668 RunDll32.exe 31 PID 668 wrote to memory of 1432 668 RunDll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\data64_6.exe"C:\Users\Admin\AppData\Local\Temp\data64_6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\vNN6.cpl",5⤵
- Loads dropped DLL
PID:1432
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad
-
Filesize
2.4MB
MD556c188ca285aee639d71fde9fee3a509
SHA1a40fd871f035e2b635af266b17023d58f3eb803e
SHA2565d3bb7982d03ebacf05e59667ef41f8453d321be74245730b99d95023e52956f
SHA51272b05b5af83c5957db2e7dd9a46e65c27eb8c175efcab6ca7675a7f3832bb1e668b689cc9afbd8400b46ab5d5b0804dc2f837ac9c34e732a3b9e7b0947c624ad