Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-10-2023 19:43
Static task
static1
Behavioral task
behavioral1
Sample
2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe
-
Size
2.1MB
-
MD5
905beeb62a986dd645799937b69ae867
-
SHA1
9792f1d2ec7802a26a2ae3f3e5c8f3bd75b4ea69
-
SHA256
2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106
-
SHA512
a8203ccdb30a56e414562302502f04d86f1a9c6928bc60bcae11be2271ced20763a64312de364e13dac7f2c1a1b9afd4d4b8368ca6ea11c43e65a49932243292
-
SSDEEP
49152:IS4je5R2J6L0wOU/uuzbLi21uwsdV72CajPPpCa++OMdcHc:ISz54o1XGLbSjoa++OOt
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2848 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2352 1716 2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe 28 PID 1716 wrote to memory of 2352 1716 2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe 28 PID 1716 wrote to memory of 2352 1716 2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe 28 PID 1716 wrote to memory of 2352 1716 2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe 28 PID 2352 wrote to memory of 2720 2352 cmd.exe 30 PID 2352 wrote to memory of 2720 2352 cmd.exe 30 PID 2352 wrote to memory of 2720 2352 cmd.exe 30 PID 2352 wrote to memory of 2720 2352 cmd.exe 30 PID 2720 wrote to memory of 2848 2720 control.exe 31 PID 2720 wrote to memory of 2848 2720 control.exe 31 PID 2720 wrote to memory of 2848 2720 control.exe 31 PID 2720 wrote to memory of 2848 2720 control.exe 31 PID 2720 wrote to memory of 2848 2720 control.exe 31 PID 2720 wrote to memory of 2848 2720 control.exe 31 PID 2720 wrote to memory of 2848 2720 control.exe 31 PID 2848 wrote to memory of 2480 2848 rundll32.exe 32 PID 2848 wrote to memory of 2480 2848 rundll32.exe 32 PID 2848 wrote to memory of 2480 2848 rundll32.exe 32 PID 2848 wrote to memory of 2480 2848 rundll32.exe 32 PID 2480 wrote to memory of 2628 2480 RunDll32.exe 33 PID 2480 wrote to memory of 2628 2480 RunDll32.exe 33 PID 2480 wrote to memory of 2628 2480 RunDll32.exe 33 PID 2480 wrote to memory of 2628 2480 RunDll32.exe 33 PID 2480 wrote to memory of 2628 2480 RunDll32.exe 33 PID 2480 wrote to memory of 2628 2480 RunDll32.exe 33 PID 2480 wrote to memory of 2628 2480 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe"C:\Users\Admin\AppData\Local\Temp\2ce06ea838ff7987486eb638d2d2286b63b7ed6b27076ac528e31b5385f07106_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7z6256D6B4\AgFTMaJ.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\control.exeCONtRoL.Exe "C:\Users\Admin\AppData\Local\Temp\7z6256D6B4\GQYZ5l0O._TO"3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z6256D6B4\GQYZ5l0O._TO"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z6256D6B4\GQYZ5l0O._TO"5⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7z6256D6B4\GQYZ5l0O._TO"6⤵
- Loads dropped DLL
PID:2628
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36B
MD5b76153b6b09f875511b1e8afcd253b06
SHA167a641b0df535af47418e5f4f6eb8cefe96807ba
SHA256ec923189abb99d26bb95c15f6f67b15f0b7c76eb32dcec9075dcef6fe7d3072b
SHA5125d4a18acf0d1d6e3db07981e0aa4ed735913eee4d1883135f698ce2b1de816a27ac876cd921ee4575eab888c2fefc04fe706020aacd1e68a942555fab220f370
-
Filesize
36B
MD5b76153b6b09f875511b1e8afcd253b06
SHA167a641b0df535af47418e5f4f6eb8cefe96807ba
SHA256ec923189abb99d26bb95c15f6f67b15f0b7c76eb32dcec9075dcef6fe7d3072b
SHA5125d4a18acf0d1d6e3db07981e0aa4ed735913eee4d1883135f698ce2b1de816a27ac876cd921ee4575eab888c2fefc04fe706020aacd1e68a942555fab220f370
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b
-
Filesize
2.3MB
MD52bf44f7c8fac91f46ccba42f768b1944
SHA144147c62dc5786b6f0bc3a7c2decdfc506a7dc11
SHA25677248f77f0823a8c763e1a1f759581539431c63f424c5e26ccb2a39561a278e1
SHA51263e32376c149f99cd15233a9517a4722338bf682ac49d09f7acd9fb55c96995c786ee99d507153de0104071c4530f49ff70378f7b8edb9f140e87a7fc8d5a54b