Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2023, 03:43

General

  • Target

    a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe

  • Size

    2.2MB

  • MD5

    56d21c311a59301117f9a313dc555320

  • SHA1

    8b4343892ab8ad4b6504911ab10ba7bf484857db

  • SHA256

    a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e

  • SHA512

    165a62714232fcaf66f51a25ec76cd8098ba089453fb08c950d8478e41c1aab6cd2698e43879e8e8f51ef469e36285d6220fc5838e1936eeaf90c2f3aa4f6f41

  • SSDEEP

    49152:ISwmCUPrexFYLROLw1TFLmJrcn2L/ncRr9QX4T4Qisexn:ISwLUPUuO81TFKJ82TOCXWhisexn

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe
    "C:\Users\Admin\AppData\Local\Temp\a2905011804a4fed28dfe74743b9fe3f50d441ffe76377226688bddc78953b0e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\Iy_.cmd" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Windows\SysWOW64\control.exe
        COntRol.Exe "C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2192
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x"
          4⤵
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1148
          • C:\Windows\system32\RunDll32.exe
            C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2524
            • C:\Windows\SysWOW64\rundll32.exe
              "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x"
              6⤵
              • Loads dropped DLL
              PID:2684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\Iy_.cmd

    Filesize

    24B

    MD5

    eac1f24dfbfc1dc1c4fe963cdc633389

    SHA1

    eeb59dafc13ffc38f593c608e322ba7f5635bde4

    SHA256

    3dd0aa43f0e33fc8a13b651fd017ce9e15b80fd0c0cc3ef98c416067bfa0bb22

    SHA512

    75749c6c2c2d0f24d79f297fd0d23f644335b7b46b0a5f728fd4cbebae34f106594cfe8e4f4c6b7f77a7469b26078b3f1344504b5216e4c2708a440a8498b6c0

  • C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\Iy_.cmd

    Filesize

    24B

    MD5

    eac1f24dfbfc1dc1c4fe963cdc633389

    SHA1

    eeb59dafc13ffc38f593c608e322ba7f5635bde4

    SHA256

    3dd0aa43f0e33fc8a13b651fd017ce9e15b80fd0c0cc3ef98c416067bfa0bb22

    SHA512

    75749c6c2c2d0f24d79f297fd0d23f644335b7b46b0a5f728fd4cbebae34f106594cfe8e4f4c6b7f77a7469b26078b3f1344504b5216e4c2708a440a8498b6c0

  • C:\Users\Admin\AppData\Local\Temp\7z6B795AD8\ZY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • \Users\Admin\AppData\Local\Temp\7z6B795AD8\zY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • \Users\Admin\AppData\Local\Temp\7z6B795AD8\zY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • \Users\Admin\AppData\Local\Temp\7z6B795AD8\zY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • \Users\Admin\AppData\Local\Temp\7z6B795AD8\zY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • \Users\Admin\AppData\Local\Temp\7z6B795AD8\zY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • \Users\Admin\AppData\Local\Temp\7z6B795AD8\zY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • \Users\Admin\AppData\Local\Temp\7z6B795AD8\zY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • \Users\Admin\AppData\Local\Temp\7z6B795AD8\zY.x

    Filesize

    2.2MB

    MD5

    198d7cdd905ba3657b5ebcb406d7c0e2

    SHA1

    24bff2f24df879de88a32a099734ca2bd3d87d9b

    SHA256

    4a18ea4d2f42b6f4862ecfb7501e4fe4dc902fd99e4264b252b8b70774597ad3

    SHA512

    885ad7f57e813e6c4cc7474ad0be3a7b62a582d40a3c460a3a1f87eef15a70c4defde488ac487d38b3147802b318d06253a89f940f4235b339caefa74966d626

  • memory/1148-27-0x0000000002790000-0x000000000287A000-memory.dmp

    Filesize

    936KB

  • memory/1148-30-0x0000000002790000-0x000000000287A000-memory.dmp

    Filesize

    936KB

  • memory/1148-31-0x0000000002790000-0x000000000287A000-memory.dmp

    Filesize

    936KB

  • memory/1148-26-0x0000000000B70000-0x0000000000C75000-memory.dmp

    Filesize

    1.0MB

  • memory/1148-24-0x0000000010000000-0x000000001023B000-memory.dmp

    Filesize

    2.2MB

  • memory/1148-23-0x0000000000130000-0x0000000000136000-memory.dmp

    Filesize

    24KB

  • memory/2684-36-0x0000000000180000-0x0000000000186000-memory.dmp

    Filesize

    24KB

  • memory/2684-39-0x0000000002760000-0x0000000002865000-memory.dmp

    Filesize

    1.0MB

  • memory/2684-40-0x0000000002870000-0x000000000295A000-memory.dmp

    Filesize

    936KB

  • memory/2684-43-0x0000000002870000-0x000000000295A000-memory.dmp

    Filesize

    936KB

  • memory/2684-44-0x0000000002870000-0x000000000295A000-memory.dmp

    Filesize

    936KB