Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 04:50
Static task
static1
Behavioral task
behavioral1
Sample
97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999.exe
Resource
win10v2004-20230915-en
General
-
Target
97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999.exe
-
Size
2.2MB
-
MD5
07d3370f9ca798615e91d61205e0b6ef
-
SHA1
779c980417ca0ce3eaa98b905bb0f4604b784105
-
SHA256
97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999
-
SHA512
d213a6e16a29dd169dc2910c51db151a45ca0445d675a9450ccc201bd6440c89caaffafa4392dca6aa0e0434d9f790925fad00b03c1958855a9b5870976e651d
-
SSDEEP
49152:Wfh2oHpjtlyng2uVPszkRAfo9hsdBbYbb84s5E2:WwoHrlyg2xzkR5YdBbYbw44E2
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4324 rundll32.exe 1120 rundll32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4408 wrote to memory of 4308 4408 97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999.exe 86 PID 4408 wrote to memory of 4308 4408 97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999.exe 86 PID 4408 wrote to memory of 4308 4408 97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999.exe 86 PID 4308 wrote to memory of 4824 4308 cmd.exe 88 PID 4308 wrote to memory of 4824 4308 cmd.exe 88 PID 4308 wrote to memory of 4824 4308 cmd.exe 88 PID 4824 wrote to memory of 4324 4824 control.exe 91 PID 4824 wrote to memory of 4324 4824 control.exe 91 PID 4824 wrote to memory of 4324 4824 control.exe 91 PID 4324 wrote to memory of 3040 4324 rundll32.exe 95 PID 4324 wrote to memory of 3040 4324 rundll32.exe 95 PID 3040 wrote to memory of 1120 3040 RunDll32.exe 96 PID 3040 wrote to memory of 1120 3040 RunDll32.exe 96 PID 3040 wrote to memory of 1120 3040 RunDll32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999.exe"C:\Users\Admin\AppData\Local\Temp\97775b6d80535de7482269ee9bb7374f33ce99a9b500fac1eb9235295d655999.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c .\UCK.baT2⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\control.exeConTROL.EXE "C:\Users\Admin\AppData\Local\Temp\7zS83141F97\BqC.V"3⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS83141F97\BqC.V"4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7zS83141F97\BqC.V"5⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7zS83141F97\BqC.V"6⤵
- Loads dropped DLL
PID:1120
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD569ecc3512762ac55f5a00e4b9a113211
SHA1a526c8f75e367a8dac1736a29a65eb2908336365
SHA256b31314a5aec6329f495f651e7486a8524e38b0aeeb547881316dda30346adb43
SHA512e3e9df205a726b4a796c16c3d28d7975dadd753e8cb3018a8f551101bbdecf9460e90899d58e6998139a065c07709426a4a61dfc1f2d62ad2c4c99402b44dc6f
-
Filesize
2.4MB
MD569ecc3512762ac55f5a00e4b9a113211
SHA1a526c8f75e367a8dac1736a29a65eb2908336365
SHA256b31314a5aec6329f495f651e7486a8524e38b0aeeb547881316dda30346adb43
SHA512e3e9df205a726b4a796c16c3d28d7975dadd753e8cb3018a8f551101bbdecf9460e90899d58e6998139a065c07709426a4a61dfc1f2d62ad2c4c99402b44dc6f
-
Filesize
2.4MB
MD569ecc3512762ac55f5a00e4b9a113211
SHA1a526c8f75e367a8dac1736a29a65eb2908336365
SHA256b31314a5aec6329f495f651e7486a8524e38b0aeeb547881316dda30346adb43
SHA512e3e9df205a726b4a796c16c3d28d7975dadd753e8cb3018a8f551101bbdecf9460e90899d58e6998139a065c07709426a4a61dfc1f2d62ad2c4c99402b44dc6f
-
Filesize
31B
MD5902459a27689b0c7ab482a62be7b3f50
SHA1168cd708cf7a2eee863d4d5bdb09b0ca68e85eb0
SHA256fbc50dc6a9066f2fb3a05f20d57e65dcab8bf35eb68059b8d92bec41b83ae622
SHA51273f09b1108e223d08090fb2ecc380af6c91f52953efdb89b457db1be15e6fd9871b76250e1175af4605049e852d2b1521f41e0799c9b1fe6440a651ce36d2fe1