Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:41
Static task
static1
Behavioral task
behavioral1
Sample
0ca817b68a4cf545e013e54fc7a92080.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ca817b68a4cf545e013e54fc7a92080.exe
Resource
win10v2004-20231215-en
General
-
Target
0ca817b68a4cf545e013e54fc7a92080.exe
-
Size
2.4MB
-
MD5
0ca817b68a4cf545e013e54fc7a92080
-
SHA1
4d3bd4759fcb91b2b262ef405760a65ef90c7399
-
SHA256
e84cac854a439ca9097b29ead5938b3fc4f867dbc7d0c388633db9df0760edcc
-
SHA512
f1c45275560fbd97cdd5fce6dd30cede344be116cdb29fef1cb8af0f4d6bac698309cb256e9ea4481e3fa49f5c2ccc5ea7b28719b487a0bc07eced37a0f1d90d
-
SSDEEP
49152:ysldGfuxKAltBwkx1MOrttjbV7ZZBZZ331Ruomp5KloYRp:ysHlw4SOHxZBRuoS5TYn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2752 2956 0ca817b68a4cf545e013e54fc7a92080.exe 18 PID 2956 wrote to memory of 2752 2956 0ca817b68a4cf545e013e54fc7a92080.exe 18 PID 2956 wrote to memory of 2752 2956 0ca817b68a4cf545e013e54fc7a92080.exe 18 PID 2956 wrote to memory of 2752 2956 0ca817b68a4cf545e013e54fc7a92080.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ca817b68a4cf545e013e54fc7a92080.exe"C:\Users\Admin\AppData\Local\Temp\0ca817b68a4cf545e013e54fc7a92080.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\JRAYPwD9.cPL",2⤵PID:2752
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\JRAYPwD9.cPL",3⤵PID:3048
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\JRAYPwD9.cPL",4⤵PID:836
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\JRAYPwD9.cPL",1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD5eb7172473d7102b5666690eacfe5b2a5
SHA10856e1b01f3c484f7caceaf32cf7defa6991790f
SHA256ee74bc38b1926bf0fed3ee6a4783dfe9bbaba154a34c5abb6bea09064aec4493
SHA5127184015eaff8e4b008bbcd7e1aeee6c14345c0a5b13e287c601655a0fd1a79697f4ef7118d50b3e139f2a5909dc0c28841198e37195f692809ac70dd9052c2d3
-
Filesize
382KB
MD51ecc7f30495c90ae70750aeeca671eee
SHA19b673185ce0662f2f9bc38542d97c9aba53bd563
SHA25662abcc7eb7b24835853b4c6835464d68abfe57f79bd0a9efc69cc74c651db0db
SHA5127faf3fefff52845e0d259ffc518e3f70ea7cdf497766c2dfc1e417ed208510e35bde3531abc01d551fa4761e7e5adc3ac559b5f4a9b8944c9b90aaf2cbf66670
-
Filesize
92KB
MD54aa378b464c4915f13f6ecfadf4cf01d
SHA153470b9d1309787afdd119e3b5edf4fbfd277d18
SHA25663453b00f2d7fbc478be2efd1a893f6de78b1a709309cdb7d42df170c250cb93
SHA5121655a2de89935a8117d022b0fd1cf51dd652849750a20038f8ec5408361f248803765202180a729b9ac98905cdc32ea110c8aba22b81503abbb13a1804b9745a