Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
19-11-2023 22:24
Static task
static1
Behavioral task
behavioral1
Sample
48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe
Resource
win10v2004-20231023-en
General
-
Target
48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe
-
Size
389KB
-
MD5
06db095ad745f4d74172f4fba8f3627b
-
SHA1
ca7b62c845365ba6b89293c58b765ae6e583574f
-
SHA256
48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
-
SHA512
394d58e36537cb2bdfd6ed5c7c0a46a8d07dd9e9c835b8bdf7ee8a7604558a217ec59eca29372cb788ee0a9708a33f2db9c1f78bebda5b799196f712a346a207
-
SSDEEP
6144:QBILQwvGEKYPrXiR8vXkQlJIX6nIFI9he4jy1JKSH:QBI8wuXCXiRclJ5x9hly1x
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
rundll32.exerundll32.exerundll32.exeflow pid process 21 2496 rundll32.exe 23 2496 rundll32.exe 26 1200 rundll32.exe 27 1200 rundll32.exe 30 108 rundll32.exe 31 108 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
Utsysc.exeUtsysc.exeUtsysc.exepid process 2652 Utsysc.exe 564 Utsysc.exe 1976 Utsysc.exe -
Loads dropped DLL 14 IoCs
Processes:
48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exerundll32.exerundll32.exerundll32.exepid process 1968 48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe 1968 48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe 2496 rundll32.exe 2496 rundll32.exe 2496 rundll32.exe 2496 rundll32.exe 1200 rundll32.exe 1200 rundll32.exe 1200 rundll32.exe 1200 rundll32.exe 108 rundll32.exe 108 rundll32.exe 108 rundll32.exe 108 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exepid process 1968 48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exeUtsysc.exetaskeng.exedescription pid process target process PID 1968 wrote to memory of 2652 1968 48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe Utsysc.exe PID 1968 wrote to memory of 2652 1968 48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe Utsysc.exe PID 1968 wrote to memory of 2652 1968 48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe Utsysc.exe PID 1968 wrote to memory of 2652 1968 48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe Utsysc.exe PID 2652 wrote to memory of 2704 2652 Utsysc.exe schtasks.exe PID 2652 wrote to memory of 2704 2652 Utsysc.exe schtasks.exe PID 2652 wrote to memory of 2704 2652 Utsysc.exe schtasks.exe PID 2652 wrote to memory of 2704 2652 Utsysc.exe schtasks.exe PID 2812 wrote to memory of 564 2812 taskeng.exe Utsysc.exe PID 2812 wrote to memory of 564 2812 taskeng.exe Utsysc.exe PID 2812 wrote to memory of 564 2812 taskeng.exe Utsysc.exe PID 2812 wrote to memory of 564 2812 taskeng.exe Utsysc.exe PID 2652 wrote to memory of 1440 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1440 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1440 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1440 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1440 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1440 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1440 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1940 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1940 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1940 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1940 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1940 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1940 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1940 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 2496 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 2496 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 2496 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 2496 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 2496 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 2496 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 2496 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1200 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1200 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1200 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1200 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1200 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1200 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 1200 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 108 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 108 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 108 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 108 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 108 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 108 2652 Utsysc.exe rundll32.exe PID 2652 wrote to memory of 108 2652 Utsysc.exe rundll32.exe PID 2812 wrote to memory of 1976 2812 taskeng.exe Utsysc.exe PID 2812 wrote to memory of 1976 2812 taskeng.exe Utsysc.exe PID 2812 wrote to memory of 1976 2812 taskeng.exe Utsysc.exe PID 2812 wrote to memory of 1976 2812 taskeng.exe Utsysc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe"C:\Users\Admin\AppData\Local\Temp\48bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:2704 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:1440
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:1940
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2496 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1200 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:108
-
C:\Windows\system32\taskeng.exetaskeng.exe {E176FD0C-3C15-470F-87F7-74AC66356951} S-1-5-21-2952504676-3105837840-1406404655-1000:URUOZWGF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:564 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:1976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD554842c11334707bbfc272691dbdb2102
SHA11b0838b4425b4ba7a205315ce4ee0bef1d74759d
SHA256023efbef9b6b7b4af77f669b63b116f702a812a65f7801591faf85d3d9ad29c6
SHA512eb44b6c4c93a4e92a35880c88ef50e402d3d62f799776c0a82a4ef86e08f85e69a0745d54aa79c2a37eccb6e120bebf29a703d52dc89b7b24d2909c87852c3e5
-
Filesize
389KB
MD506db095ad745f4d74172f4fba8f3627b
SHA1ca7b62c845365ba6b89293c58b765ae6e583574f
SHA25648bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
SHA512394d58e36537cb2bdfd6ed5c7c0a46a8d07dd9e9c835b8bdf7ee8a7604558a217ec59eca29372cb788ee0a9708a33f2db9c1f78bebda5b799196f712a346a207
-
Filesize
389KB
MD506db095ad745f4d74172f4fba8f3627b
SHA1ca7b62c845365ba6b89293c58b765ae6e583574f
SHA25648bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
SHA512394d58e36537cb2bdfd6ed5c7c0a46a8d07dd9e9c835b8bdf7ee8a7604558a217ec59eca29372cb788ee0a9708a33f2db9c1f78bebda5b799196f712a346a207
-
Filesize
389KB
MD506db095ad745f4d74172f4fba8f3627b
SHA1ca7b62c845365ba6b89293c58b765ae6e583574f
SHA25648bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
SHA512394d58e36537cb2bdfd6ed5c7c0a46a8d07dd9e9c835b8bdf7ee8a7604558a217ec59eca29372cb788ee0a9708a33f2db9c1f78bebda5b799196f712a346a207
-
Filesize
389KB
MD506db095ad745f4d74172f4fba8f3627b
SHA1ca7b62c845365ba6b89293c58b765ae6e583574f
SHA25648bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
SHA512394d58e36537cb2bdfd6ed5c7c0a46a8d07dd9e9c835b8bdf7ee8a7604558a217ec59eca29372cb788ee0a9708a33f2db9c1f78bebda5b799196f712a346a207
-
Filesize
389KB
MD506db095ad745f4d74172f4fba8f3627b
SHA1ca7b62c845365ba6b89293c58b765ae6e583574f
SHA25648bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
SHA512394d58e36537cb2bdfd6ed5c7c0a46a8d07dd9e9c835b8bdf7ee8a7604558a217ec59eca29372cb788ee0a9708a33f2db9c1f78bebda5b799196f712a346a207
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
389KB
MD506db095ad745f4d74172f4fba8f3627b
SHA1ca7b62c845365ba6b89293c58b765ae6e583574f
SHA25648bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
SHA512394d58e36537cb2bdfd6ed5c7c0a46a8d07dd9e9c835b8bdf7ee8a7604558a217ec59eca29372cb788ee0a9708a33f2db9c1f78bebda5b799196f712a346a207
-
Filesize
389KB
MD506db095ad745f4d74172f4fba8f3627b
SHA1ca7b62c845365ba6b89293c58b765ae6e583574f
SHA25648bcf2b8e6a7bd4a807cde942b014848dfc1a0e65fde4959f6c187ea547e659e
SHA512394d58e36537cb2bdfd6ed5c7c0a46a8d07dd9e9c835b8bdf7ee8a7604558a217ec59eca29372cb788ee0a9708a33f2db9c1f78bebda5b799196f712a346a207
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7