Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
19/11/2023, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe
Resource
win10v2004-20231023-en
General
-
Target
ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe
-
Size
386KB
-
MD5
3e368055148cb6a46d2c37c22e7b6d7c
-
SHA1
5ff4a741c50a7ba749db056f6c8576e1c9f07a93
-
SHA256
ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
-
SHA512
82445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
SSDEEP
6144:CoLwV/vaoA4iuDorUhN0cTV06WCKRkqGxT68JmFc56:Co0V/ziMLhNZ6kiFGE8JmFS
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 23 2752 rundll32.exe 25 2752 rundll32.exe 28 1556 rundll32.exe 29 1556 rundll32.exe 32 2264 rundll32.exe 33 2264 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
pid Process 2700 Utsysc.exe 2816 Utsysc.exe 1976 Utsysc.exe 2408 Utsysc.exe -
Loads dropped DLL 14 IoCs
pid Process 2232 ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe 2232 ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe 2752 rundll32.exe 1556 rundll32.exe 1556 rundll32.exe 1556 rundll32.exe 1556 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe 2264 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3064 schtasks.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2232 ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2700 2232 ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe 28 PID 2232 wrote to memory of 2700 2232 ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe 28 PID 2232 wrote to memory of 2700 2232 ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe 28 PID 2232 wrote to memory of 2700 2232 ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe 28 PID 2700 wrote to memory of 3064 2700 Utsysc.exe 29 PID 2700 wrote to memory of 3064 2700 Utsysc.exe 29 PID 2700 wrote to memory of 3064 2700 Utsysc.exe 29 PID 2700 wrote to memory of 3064 2700 Utsysc.exe 29 PID 2768 wrote to memory of 2816 2768 taskeng.exe 34 PID 2768 wrote to memory of 2816 2768 taskeng.exe 34 PID 2768 wrote to memory of 2816 2768 taskeng.exe 34 PID 2768 wrote to memory of 2816 2768 taskeng.exe 34 PID 2700 wrote to memory of 772 2700 Utsysc.exe 38 PID 2700 wrote to memory of 772 2700 Utsysc.exe 38 PID 2700 wrote to memory of 772 2700 Utsysc.exe 38 PID 2700 wrote to memory of 772 2700 Utsysc.exe 38 PID 2700 wrote to memory of 772 2700 Utsysc.exe 38 PID 2700 wrote to memory of 772 2700 Utsysc.exe 38 PID 2700 wrote to memory of 772 2700 Utsysc.exe 38 PID 2700 wrote to memory of 268 2700 Utsysc.exe 39 PID 2700 wrote to memory of 268 2700 Utsysc.exe 39 PID 2700 wrote to memory of 268 2700 Utsysc.exe 39 PID 2700 wrote to memory of 268 2700 Utsysc.exe 39 PID 2700 wrote to memory of 268 2700 Utsysc.exe 39 PID 2700 wrote to memory of 268 2700 Utsysc.exe 39 PID 2700 wrote to memory of 268 2700 Utsysc.exe 39 PID 2700 wrote to memory of 2752 2700 Utsysc.exe 40 PID 2700 wrote to memory of 2752 2700 Utsysc.exe 40 PID 2700 wrote to memory of 2752 2700 Utsysc.exe 40 PID 2700 wrote to memory of 2752 2700 Utsysc.exe 40 PID 2700 wrote to memory of 2752 2700 Utsysc.exe 40 PID 2700 wrote to memory of 2752 2700 Utsysc.exe 40 PID 2700 wrote to memory of 2752 2700 Utsysc.exe 40 PID 2700 wrote to memory of 1556 2700 Utsysc.exe 42 PID 2700 wrote to memory of 1556 2700 Utsysc.exe 42 PID 2700 wrote to memory of 1556 2700 Utsysc.exe 42 PID 2700 wrote to memory of 1556 2700 Utsysc.exe 42 PID 2700 wrote to memory of 1556 2700 Utsysc.exe 42 PID 2700 wrote to memory of 1556 2700 Utsysc.exe 42 PID 2700 wrote to memory of 1556 2700 Utsysc.exe 42 PID 2768 wrote to memory of 1976 2768 taskeng.exe 44 PID 2768 wrote to memory of 1976 2768 taskeng.exe 44 PID 2768 wrote to memory of 1976 2768 taskeng.exe 44 PID 2768 wrote to memory of 1976 2768 taskeng.exe 44 PID 2700 wrote to memory of 2264 2700 Utsysc.exe 45 PID 2700 wrote to memory of 2264 2700 Utsysc.exe 45 PID 2700 wrote to memory of 2264 2700 Utsysc.exe 45 PID 2700 wrote to memory of 2264 2700 Utsysc.exe 45 PID 2700 wrote to memory of 2264 2700 Utsysc.exe 45 PID 2700 wrote to memory of 2264 2700 Utsysc.exe 45 PID 2700 wrote to memory of 2264 2700 Utsysc.exe 45 PID 2768 wrote to memory of 2408 2768 taskeng.exe 47 PID 2768 wrote to memory of 2408 2768 taskeng.exe 47 PID 2768 wrote to memory of 2408 2768 taskeng.exe 47 PID 2768 wrote to memory of 2408 2768 taskeng.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe"C:\Users\Admin\AppData\Local\Temp\ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Utsysc.exe /TR "C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe" /F3⤵
- Creates scheduled task(s)
PID:3064
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:772
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\cred64.dll, Main3⤵PID:268
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2752
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1556
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\2eed656dd58e95\clip64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:2264
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {B30F6EEE-28A2-4C83-B2B4-BCC771ECFB09} S-1-5-21-3618187007-3650799920-3290345941-1000:BPDFUYWR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exeC:\Users\Admin\AppData\Local\Temp\d4dd819322\Utsysc.exe2⤵
- Executes dropped EXE
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD52a370ab111c156e1e82e2b7cf01cf638
SHA12f1a75ffa273ed964b0d1e9a17faddea3d4be329
SHA256f64389f6727f702a6cdfb8ad18a2901ae142f6f730480afaa3b9ea3e885fe307
SHA51205d9ece93ab16162ea14fa3d5c9d0549312ffc4e262402f69a8ee6bb2401dcf8a0c13ea7e9934764d5794eb339afe0df1cd9bae7a1af202f780c9f12bbfb428c
-
Filesize
386KB
MD53e368055148cb6a46d2c37c22e7b6d7c
SHA15ff4a741c50a7ba749db056f6c8576e1c9f07a93
SHA256ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
SHA51282445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
Filesize
386KB
MD53e368055148cb6a46d2c37c22e7b6d7c
SHA15ff4a741c50a7ba749db056f6c8576e1c9f07a93
SHA256ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
SHA51282445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
Filesize
386KB
MD53e368055148cb6a46d2c37c22e7b6d7c
SHA15ff4a741c50a7ba749db056f6c8576e1c9f07a93
SHA256ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
SHA51282445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
Filesize
386KB
MD53e368055148cb6a46d2c37c22e7b6d7c
SHA15ff4a741c50a7ba749db056f6c8576e1c9f07a93
SHA256ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
SHA51282445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
Filesize
386KB
MD53e368055148cb6a46d2c37c22e7b6d7c
SHA15ff4a741c50a7ba749db056f6c8576e1c9f07a93
SHA256ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
SHA51282445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
Filesize
386KB
MD53e368055148cb6a46d2c37c22e7b6d7c
SHA15ff4a741c50a7ba749db056f6c8576e1c9f07a93
SHA256ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
SHA51282445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
66KB
MD59b0507b53287ffe4c3af7ea8413b3998
SHA1a042a1973f9714866e8156a8f714926c2bb02b3f
SHA25670746fa232ede6a0818ad60d2552f22b5cce9b06181c6bfa1808fe5a1c313db1
SHA512a46f2e4380c13b4f48f3e8e60522f6e707a0c198e53fa37ae478f2323017e1106e77f1542db3c01c9d534c59c5ec0cd4f604886fb8d04bab77b06bc13464f521
-
Filesize
386KB
MD53e368055148cb6a46d2c37c22e7b6d7c
SHA15ff4a741c50a7ba749db056f6c8576e1c9f07a93
SHA256ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
SHA51282445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
Filesize
386KB
MD53e368055148cb6a46d2c37c22e7b6d7c
SHA15ff4a741c50a7ba749db056f6c8576e1c9f07a93
SHA256ca3cc0a015ed43a1441a993097ec2e774ad3823d372fe2a78ef2c42ecf7eb7fe
SHA51282445e8c8409817dfa3ffa699a42a0f6449c0377d7729238a86f4d3fe86fc60da2d34c80d720b86dab20f072281a0ad52b159335d33fb9e893fbf37000b06429
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7
-
Filesize
102KB
MD54194e9b8b694b1e9b672c36f0d868e32
SHA1252f27fe313c7bf8e9f36aef0c7b676383872efb
SHA25697e342fb4dbfe474ab2674682a816931bb9f56814bf13b20ff11ac1939775125
SHA512f956acdec4c0255030f784d27210d59e30c3377e0a5abec915818bde8545afc3ef04a06395a2bfa5946f86cdf1088c9089bfc5064d9fd71b8137eae14f64e5c7