Analysis
-
max time kernel
127s -
max time network
132s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
06/10/2023, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
6d0dce536c7d15a7be5626981a16ef077ed1109a67b3d0e91943128be32c2a74.exe
Resource
win10-20230915-en
General
-
Target
6d0dce536c7d15a7be5626981a16ef077ed1109a67b3d0e91943128be32c2a74.exe
-
Size
1.6MB
-
MD5
5af4ac7bcae31673d816c948f331f44e
-
SHA1
615235823768a7ead939050d3bf527d0e5b9dbb9
-
SHA256
6d0dce536c7d15a7be5626981a16ef077ed1109a67b3d0e91943128be32c2a74
-
SHA512
558cefbed4f67206bf8f655ef0b533e50c5b02aba5e4495d3ba021834fd4e5d78f8ed51e3b39de409d57dddbf955cbdcb837c92acf6b504d4e872637b00c2440
-
SSDEEP
49152:mcB/J9443O1jVRGx4GOfiOwd5SCBz31JDDs2Isc9Vb3:mCUqO1jVRGixfq1p31dI5Vb3
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 3016 rundll32.exe 764 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3220 wrote to memory of 1672 3220 6d0dce536c7d15a7be5626981a16ef077ed1109a67b3d0e91943128be32c2a74.exe 69 PID 3220 wrote to memory of 1672 3220 6d0dce536c7d15a7be5626981a16ef077ed1109a67b3d0e91943128be32c2a74.exe 69 PID 3220 wrote to memory of 1672 3220 6d0dce536c7d15a7be5626981a16ef077ed1109a67b3d0e91943128be32c2a74.exe 69 PID 1672 wrote to memory of 3024 1672 cmd.exe 71 PID 1672 wrote to memory of 3024 1672 cmd.exe 71 PID 1672 wrote to memory of 3024 1672 cmd.exe 71 PID 3024 wrote to memory of 3016 3024 control.exe 72 PID 3024 wrote to memory of 3016 3024 control.exe 72 PID 3024 wrote to memory of 3016 3024 control.exe 72 PID 3016 wrote to memory of 2100 3016 rundll32.exe 73 PID 3016 wrote to memory of 2100 3016 rundll32.exe 73 PID 2100 wrote to memory of 764 2100 RunDll32.exe 74 PID 2100 wrote to memory of 764 2100 RunDll32.exe 74 PID 2100 wrote to memory of 764 2100 RunDll32.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d0dce536c7d15a7be5626981a16ef077ed1109a67b3d0e91943128be32c2a74.exe"C:\Users\Admin\AppData\Local\Temp\6d0dce536c7d15a7be5626981a16ef077ed1109a67b3d0e91943128be32c2a74.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\RSg.cmD2⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\control.execOntrOl.eXe "C:\Users\Admin\AppData\Local\Temp\7zS49C20B87\YbWF.X"3⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS49C20B87\YbWF.X"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS49C20B87\YbWF.X"5⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zS49C20B87\YbWF.X"6⤵
- Loads dropped DLL
PID:764
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5af982d040ea360b8ac44d07419d1cf7f
SHA1856165e498208878ba00a587e1de16c600966669
SHA2564e1a7046c72d3a161460bdbfe6774a86d8ec7d327f7e4a4d47782272a558fb6a
SHA51280096e07a0c4663f61fa4e1df2c3798805e266b2d23aaf3aeff62f404b71d2e3329cb2c2098d6825ab8fff749c02d54329455793ae50ec8069b8269e74aa86f1
-
Filesize
1.6MB
MD5fa955b95b690c7148201341b3d35b62f
SHA12bd6d77e3574afe4dd429490f067babf05e0c771
SHA256b62a47302c1f019154f830290ab2228e13867e9e8bc5541ff0472ac151f17e6f
SHA512498af67712877e6db7fb8fc304a38a4a0bfe4708c69013442ea183c8aa66df94cadaedd32611fb042b20a0861656ed7f1a92702acd8a20741ead0f400b77b2b0
-
Filesize
1.6MB
MD5fa955b95b690c7148201341b3d35b62f
SHA12bd6d77e3574afe4dd429490f067babf05e0c771
SHA256b62a47302c1f019154f830290ab2228e13867e9e8bc5541ff0472ac151f17e6f
SHA512498af67712877e6db7fb8fc304a38a4a0bfe4708c69013442ea183c8aa66df94cadaedd32611fb042b20a0861656ed7f1a92702acd8a20741ead0f400b77b2b0
-
Filesize
1.6MB
MD5fa955b95b690c7148201341b3d35b62f
SHA12bd6d77e3574afe4dd429490f067babf05e0c771
SHA256b62a47302c1f019154f830290ab2228e13867e9e8bc5541ff0472ac151f17e6f
SHA512498af67712877e6db7fb8fc304a38a4a0bfe4708c69013442ea183c8aa66df94cadaedd32611fb042b20a0861656ed7f1a92702acd8a20741ead0f400b77b2b0