Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/10/2023, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe
Resource
win10-20230915-en
General
-
Target
a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe
-
Size
2.2MB
-
MD5
56d21c311a59301117f9a313dc555320
-
SHA1
8b4343892ab8ad4b6504911ab10ba7bf484857db
-
SHA256
a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e
-
SHA512
165a62714232fcaf66f51a25ec76cd8098ba089453fb08c950d8478e41c1aab6cd2698e43879e8e8f51ef469e36285d6220fc5838e1936eeaf90c2f3aa4f6f41
-
SSDEEP
49152:ISwmCUPrexFYLROLw1TFLmJrcn2L/ncRr9QX4T4Qisexn:ISwLUPUuO81TFKJ82TOCXWhisexn
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 1148 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe 2684 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2776 wrote to memory of 1932 2776 a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe 28 PID 2776 wrote to memory of 1932 2776 a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe 28 PID 2776 wrote to memory of 1932 2776 a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe 28 PID 2776 wrote to memory of 1932 2776 a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe 28 PID 1932 wrote to memory of 2192 1932 cmd.exe 30 PID 1932 wrote to memory of 2192 1932 cmd.exe 30 PID 1932 wrote to memory of 2192 1932 cmd.exe 30 PID 1932 wrote to memory of 2192 1932 cmd.exe 30 PID 2192 wrote to memory of 1148 2192 control.exe 31 PID 2192 wrote to memory of 1148 2192 control.exe 31 PID 2192 wrote to memory of 1148 2192 control.exe 31 PID 2192 wrote to memory of 1148 2192 control.exe 31 PID 2192 wrote to memory of 1148 2192 control.exe 31 PID 2192 wrote to memory of 1148 2192 control.exe 31 PID 2192 wrote to memory of 1148 2192 control.exe 31 PID 1148 wrote to memory of 2524 1148 rundll32.exe 32 PID 1148 wrote to memory of 2524 1148 rundll32.exe 32 PID 1148 wrote to memory of 2524 1148 rundll32.exe 32 PID 1148 wrote to memory of 2524 1148 rundll32.exe 32 PID 2524 wrote to memory of 2684 2524 RunDll32.exe 33 PID 2524 wrote to memory of 2684 2524 RunDll32.exe 33 PID 2524 wrote to memory of 2684 2524 RunDll32.exe 33 PID 2524 wrote to memory of 2684 2524 RunDll32.exe 33 PID 2524 wrote to memory of 2684 2524 RunDll32.exe 33 PID 2524 wrote to memory of 2684 2524 RunDll32.exe 33 PID 2524 wrote to memory of 2684 2524 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe"C:\Users\Admin\AppData\Local\Temp\a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\Iy_.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\control.exeCOntRol.Exe "C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x"3⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x"5⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x"6⤵
- Loads dropped DLL
PID:2684
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24B
MD5eac1f24dfbfc1dc1c4fe963cdc633389
SHA1eeb59dafc13ffc38f593c608e322ba7f5635bde4
SHA2563dd0aa43f0e33fc8a13b651fd017ce9e15b80fd0c0cc3ef98c416067bfa0bb22
SHA51275749c6c2c2d0f24d79f297fd0d23f644335b7b46b0a5f728fd4cbebae34f106594cfe8e4f4c6b7f77a7469b26078b3f1344504b5216e4c2708a440a8498b6c0
-
Filesize
24B
MD5eac1f24dfbfc1dc1c4fe963cdc633389
SHA1eeb59dafc13ffc38f593c608e322ba7f5635bde4
SHA2563dd0aa43f0e33fc8a13b651fd017ce9e15b80fd0c0cc3ef98c416067bfa0bb22
SHA51275749c6c2c2d0f24d79f297fd0d23f644335b7b46b0a5f728fd4cbebae34f106594cfe8e4f4c6b7f77a7469b26078b3f1344504b5216e4c2708a440a8498b6c0
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626
-
Filesize
2.2MB
MD5198d7cdd905ba3657b5ebcb406d7c0e2
SHA124bff2f24df879de88a32a099734ca2bd3d87d9b
SHA2564a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3
SHA512885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626