Analysis
-
max time kernel
136s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe
Resource
win10-20231215-en
General
-
Target
4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe
-
Size
1.8MB
-
MD5
cdcc0278c1494afd914ce7bbe69dcd0f
-
SHA1
dbb27f4b11180d1d78a938a8eb7ad44cd8e5e6d8
-
SHA256
4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a
-
SHA512
b4f9767317c49afcd12430b82b9f2e9a726c7666195eacba74898e19f5e02fd88fda3e6c563d0aaf57aa2ce2623b135f2c2e87e8a165248cdbf06b32b6c26cd8
-
SSDEEP
49152:ye2YXTdywxc/oLyfW2OH1a7u1fGY4Pa+M+jvzKhIeg:yeRRyw+bfW2eJGYobMQz2Ip
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 2632 rundll32.exe 832 rundll32.exe 832 rundll32.exe 832 rundll32.exe 832 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1680 wrote to memory of 876 1680 4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe 28 PID 1680 wrote to memory of 876 1680 4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe 28 PID 1680 wrote to memory of 876 1680 4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe 28 PID 1680 wrote to memory of 876 1680 4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe 28 PID 876 wrote to memory of 2704 876 cmd.exe 30 PID 876 wrote to memory of 2704 876 cmd.exe 30 PID 876 wrote to memory of 2704 876 cmd.exe 30 PID 876 wrote to memory of 2704 876 cmd.exe 30 PID 2704 wrote to memory of 2632 2704 control.exe 31 PID 2704 wrote to memory of 2632 2704 control.exe 31 PID 2704 wrote to memory of 2632 2704 control.exe 31 PID 2704 wrote to memory of 2632 2704 control.exe 31 PID 2704 wrote to memory of 2632 2704 control.exe 31 PID 2704 wrote to memory of 2632 2704 control.exe 31 PID 2704 wrote to memory of 2632 2704 control.exe 31 PID 2632 wrote to memory of 976 2632 rundll32.exe 32 PID 2632 wrote to memory of 976 2632 rundll32.exe 32 PID 2632 wrote to memory of 976 2632 rundll32.exe 32 PID 2632 wrote to memory of 976 2632 rundll32.exe 32 PID 976 wrote to memory of 832 976 RunDll32.exe 33 PID 976 wrote to memory of 832 976 RunDll32.exe 33 PID 976 wrote to memory of 832 976 RunDll32.exe 33 PID 976 wrote to memory of 832 976 RunDll32.exe 33 PID 976 wrote to memory of 832 976 RunDll32.exe 33 PID 976 wrote to memory of 832 976 RunDll32.exe 33 PID 976 wrote to memory of 832 976 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe"C:\Users\Admin\AppData\Local\Temp\4fc59da25697b98d53f7bcd45f3770c9ab97be40e183bd08565a7dd6e8ab409a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7z608AB690\K3SBB.CMd" "2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\7z608AB690\YjY.cPl",3⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z608AB690\YjY.cPl",4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z608AB690\YjY.cPl",5⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7z608AB690\YjY.cPl",6⤵
- Loads dropped DLL
PID:832
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD53128f6eb6310b4e355efd6b5db9ee666
SHA17d5437849f01f1b73bab71ab9880492ec7ba3e70
SHA256347d8e9e5613514d9f1d2c5d79fc69ba5454b0e66389ae2bf250275c33abbbce
SHA5122c2711731be4f3939151d6d02a51d23a74c376b3b105a72dd6a42506b2d3dbc415bca487e1a1cec9bddadef10aa1dd134a1ca0a84b016165c9e4a6848b9b10a1
-
Filesize
1.2MB
MD513bd4f620e45cce309be7cf2391130cb
SHA1b34ffa24a87db654d46142e9cd641955ea6564b5
SHA2562ede42e997a327d5fed28d4b53d3ebb06445ed6c460e407a48b2e2d409a6cd64
SHA512b23667023c0d2361173870267824741eadadd0a96349272e50960851dc96de251273eead3aafb82791dae232f3dc02e95502f81a135bd7e229ec230f78a917b7
-
Filesize
14KB
MD51efd47da4e14074c2b5ee2fbc2d1b9cf
SHA169a5ce25e33219f9f5fe8d176240387c2eb46aca
SHA256ee9ae5e4791a0c5f904ed928bcfd9cc4a36534eef635a03a93aee074faa878aa
SHA5124ba2d1bada01288db04a4dfa8e198e7245361b53300f462334344c072fb73b1c9c37b823e560e4f536efa810a1b97c15d9b319897571f54383542eab9dca9fb8
-
Filesize
24KB
MD575e6b044b9c2269c755090a2493761c5
SHA1f3317b28083f125dbe356146dfdae6e0e5b4f70a
SHA256bc929590854e2c2a338b2057281586fb6eeadaec1d7de2c38b1ca4a8d87bc41f
SHA512aec733f2d2b015406cff90f951bd8b6580b16ae094ee15c1bdfd2298f3d693813ff246b18aa5207b66d2b6a845b31c61bcf8fcc3e19f964ce90e5d405b114b8e
-
Filesize
1KB
MD58de337d72508e89f72660846ef8f0353
SHA1c0dcfef94579f5b87ab9a699b709ac3e84b2abcb
SHA25603cc77a1ca5c171248e7177ace8ee82277571be0b8df4d39560cfd7d2b2aed6c
SHA5124dc13d795028afcdddebbda11be003a749befaf15456d1b9d543fcc97ab88f5547d0005e97698c7bae784274e7374ad4330df9504ad3a591a3a33da5b60052b1
-
Filesize
154KB
MD517f93644252043ed1af56a86e56bd2ef
SHA13dc625e85453c65f183c8b9198df8f84e3ed81ec
SHA2561a689caed7cfe4ef1533580b877f54e279f93762ed56c4a2f3e449b9268f6982
SHA512b72b686b3a8fc77cbe1b142309d1f78246dfafe471ff123f57c27e62e4b587ef998f65e0c1bfc23e99c2f5a46c894bbc7c47fcddce003bab83a5110d484d1116
-
Filesize
323KB
MD59e06c62235d7a7400dc45f32a7332284
SHA1d11d41e46c5eaba644fb9536a4037bfe822f1319
SHA25636b8443d1dbc7aa9d42de05a899a87c42965649c5f6531fba534a2fad71ede46
SHA512644e9cd9281db756a3b921e888a6dffac8526c8b7e1572b30431ad22ab35aac63e8a820c5b99f8bffcaf5ec3c284ae85a3fdf4cf54585606f73a5849ff2225bf
-
Filesize
78KB
MD59c5177cb6bb9ec1c65cd16bc9105113b
SHA190e7b04c23288f0ee7dc59bac0eda3f8696d2c93
SHA256df4ed982aed2defab28864f6f7f17a038880b64b7305bf725d9a6927981dc182
SHA5128fd00e3ab54724cb64cc61f5b486f97ab18620c605bed7698b70bed5c9ec22b16bd93950dc07a39840e6c7022d5ee202268eff2196330ee58697e54be4572601
-
Filesize
78KB
MD5502cdb8718134587cfed178ee75970f8
SHA1d1a0d8247e69f87e3714cc3705614e89bd03fa66
SHA2562a5ab785034e634e74c46a332a5da1455eef5070eb735cf07d115150c3f18ca4
SHA512f3e5127e4072e15c044ebeeb068a33290c9eee6a9d7813d32c1a8cdb174b0c3fd026b606c6d96c03bbd04c223cad24c99c5e6742e98aaf9e0e8cc2c26a08e774