Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/07/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe
Resource
win10-20230703-en
General
-
Target
1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe
-
Size
1.5MB
-
MD5
337d4755b3d63869323ac35c9a3f96c4
-
SHA1
22e5d0f9cdc241327cf12a7774a3f692e0c59b69
-
SHA256
1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01
-
SHA512
b38a520acbf162eb36afa2649590232518e0924944fb367ce9a3e1c8b0d2562669693cadc6a701356d287f7c4cb59b599722ba1d9cf96fc6cc476cdbb3d6865d
-
SSDEEP
49152:8cbi6BimUH/b228b1YGd4XnIuDBbcJXVHlcO:8cbLimqp8bmG0IOb2t
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1200 rundll32.exe 1200 rundll32.exe 1200 rundll32.exe 1200 rundll32.exe 2820 rundll32.exe 2820 rundll32.exe 2820 rundll32.exe 2820 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2324 2204 1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe 28 PID 2204 wrote to memory of 2324 2204 1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe 28 PID 2204 wrote to memory of 2324 2204 1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe 28 PID 2204 wrote to memory of 2324 2204 1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe 28 PID 2324 wrote to memory of 1200 2324 control.exe 29 PID 2324 wrote to memory of 1200 2324 control.exe 29 PID 2324 wrote to memory of 1200 2324 control.exe 29 PID 2324 wrote to memory of 1200 2324 control.exe 29 PID 2324 wrote to memory of 1200 2324 control.exe 29 PID 2324 wrote to memory of 1200 2324 control.exe 29 PID 2324 wrote to memory of 1200 2324 control.exe 29 PID 1200 wrote to memory of 2832 1200 rundll32.exe 30 PID 1200 wrote to memory of 2832 1200 rundll32.exe 30 PID 1200 wrote to memory of 2832 1200 rundll32.exe 30 PID 1200 wrote to memory of 2832 1200 rundll32.exe 30 PID 2832 wrote to memory of 2820 2832 RunDll32.exe 31 PID 2832 wrote to memory of 2820 2832 RunDll32.exe 31 PID 2832 wrote to memory of 2820 2832 RunDll32.exe 31 PID 2832 wrote to memory of 2820 2832 RunDll32.exe 31 PID 2832 wrote to memory of 2820 2832 RunDll32.exe 31 PID 2832 wrote to memory of 2820 2832 RunDll32.exe 31 PID 2832 wrote to memory of 2820 2832 RunDll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe"C:\Users\Admin\AppData\Local\Temp\1eb2a742dccf0d51f3bcf3f37829adebd9b0a2e758d57d292f7622977e747c01.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\GDaUO.CPl",2⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\GDaUO.CPl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\GDaUO.CPl",4⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\GDaUO.CPl",5⤵
- Loads dropped DLL
PID:2820
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c
-
Filesize
1.3MB
MD5859b6be077ff6384f8404e667b6fccbf
SHA100908039e3906b066e2a68ded4a7c11b61fde70a
SHA256b5291cafccb9860693507f9cc92d4588790936d3dbdab9f72e277549cf9fb432
SHA512de53c792839149d28667f38d03df59bbf50f38f8114cebe353d26510bed1f006839feca0c16c13ba9f1a93989ee8e3fc18378aced6c993bb0e64f64b09d3968c