Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2023, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162_JC.exe
-
Size
2.2MB
-
MD5
1fb6590ffcdc704552cf24318a640fff
-
SHA1
1a1c9dfe7bb2c8cd187b5fb66a8fceefbc1f724b
-
SHA256
5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162
-
SHA512
e73649137afef20c23d9d2fa98143a5237f0d3b3c70fd4d21fae078ea97584dcc45fc05f8979a12102de5bbf44ca75edacaf17d2bff599085b4a3b75ce5e8a1e
-
SSDEEP
49152:WfRn+UB5b0HHgrYTtSkFk56FtbwYeueJKtws1X0ruU:Wh5uHA4k4NeJKtwsZ0r3
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4188 rundll32.exe 4608 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1052 wrote to memory of 3480 1052 5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162_JC.exe 84 PID 1052 wrote to memory of 3480 1052 5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162_JC.exe 84 PID 1052 wrote to memory of 3480 1052 5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162_JC.exe 84 PID 3480 wrote to memory of 1536 3480 cmd.exe 86 PID 3480 wrote to memory of 1536 3480 cmd.exe 86 PID 3480 wrote to memory of 1536 3480 cmd.exe 86 PID 1536 wrote to memory of 4188 1536 control.exe 88 PID 1536 wrote to memory of 4188 1536 control.exe 88 PID 1536 wrote to memory of 4188 1536 control.exe 88 PID 4188 wrote to memory of 2172 4188 rundll32.exe 96 PID 4188 wrote to memory of 2172 4188 rundll32.exe 96 PID 2172 wrote to memory of 4608 2172 RunDll32.exe 97 PID 2172 wrote to memory of 4608 2172 RunDll32.exe 97 PID 2172 wrote to memory of 4608 2172 RunDll32.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162_JC.exe"C:\Users\Admin\AppData\Local\Temp\5d4111d129f9502329b4da06459f6bfbc4c55a9bd033d8cd4566cb4018887162_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\X0QfU.Bat2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\control.exeCoNtrOl "C:\Users\Admin\AppData\Local\Temp\7zSC14444F7\zQzUVS1.ZJV"3⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zSC14444F7\zQzUVS1.ZJV"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zSC14444F7\zQzUVS1.ZJV"5⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zSC14444F7\zQzUVS1.ZJV"6⤵
- Loads dropped DLL
PID:4608
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD55fab49e4ab64338acdf391018ef98f14
SHA167ec59276392ee371a0a72df2fba853217b577c4
SHA256211f4e55008449ec51fabe8cf32cf8f872417f95f2fda5afd7a769300ebf0402
SHA512cd5466ea848f9c87f5ffdd9fffa2e93a32d74d35a7ad10222db8a601f1597a792b8c462ec7b7083ae14216614b2efbc48feaaa40b82cd7973955a9a5913b6a8e
-
Filesize
2.3MB
MD5bb54dfc57eaf3b1740f829b9a93d7c77
SHA1637369659b61a0f4a7353b8484ee16cabccff77d
SHA256a67395e5a5032bebb11f7c723b6030dcd603028d2f52858646e6dc1784e39162
SHA512122fca1b2ec3e1ad0d83c3a838f2bee272cf60bbbafd493a41d456bebe648bf862d049add27435c18d41471f27adf231cc6807d58f265667ab15355bd894baa6
-
Filesize
2.3MB
MD5bb54dfc57eaf3b1740f829b9a93d7c77
SHA1637369659b61a0f4a7353b8484ee16cabccff77d
SHA256a67395e5a5032bebb11f7c723b6030dcd603028d2f52858646e6dc1784e39162
SHA512122fca1b2ec3e1ad0d83c3a838f2bee272cf60bbbafd493a41d456bebe648bf862d049add27435c18d41471f27adf231cc6807d58f265667ab15355bd894baa6
-
Filesize
2.3MB
MD5bb54dfc57eaf3b1740f829b9a93d7c77
SHA1637369659b61a0f4a7353b8484ee16cabccff77d
SHA256a67395e5a5032bebb11f7c723b6030dcd603028d2f52858646e6dc1784e39162
SHA512122fca1b2ec3e1ad0d83c3a838f2bee272cf60bbbafd493a41d456bebe648bf862d049add27435c18d41471f27adf231cc6807d58f265667ab15355bd894baa6