Analysis
-
max time kernel
219s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 07:44
Static task
static1
Behavioral task
behavioral1
Sample
bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe
Resource
win10-20231220-en
General
-
Target
bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe
-
Size
3.1MB
-
MD5
00f7d424988fdf1ed2d04905d90fe256
-
SHA1
ee53d07b3098a60bdb15813caa4276e32a80718f
-
SHA256
bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938
-
SHA512
0fc5af193d711b035097e81cc3153f509c74e5b1e07e2aca2b605995b544efc0163ce003d20df0e5904308007ed4937bab5dc984e9ed85c1d2b1935e2db9cf77
-
SSDEEP
49152:anGImUjB32I4AX4hnFNYcJES0jV48gx1SrnYIw3OFB8Ax+AIONL4zu74IPsnzZKa:aGIjB6AohnFKyG4JvS7rw38B+AIHElPC
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2796 rundll32.exe 2796 rundll32.exe 2796 rundll32.exe 2796 rundll32.exe 2212 rundll32.exe 2212 rundll32.exe 2212 rundll32.exe 2212 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2784 2916 bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe 28 PID 2916 wrote to memory of 2784 2916 bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe 28 PID 2916 wrote to memory of 2784 2916 bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe 28 PID 2916 wrote to memory of 2784 2916 bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe 28 PID 2784 wrote to memory of 2796 2784 control.exe 29 PID 2784 wrote to memory of 2796 2784 control.exe 29 PID 2784 wrote to memory of 2796 2784 control.exe 29 PID 2784 wrote to memory of 2796 2784 control.exe 29 PID 2784 wrote to memory of 2796 2784 control.exe 29 PID 2784 wrote to memory of 2796 2784 control.exe 29 PID 2784 wrote to memory of 2796 2784 control.exe 29 PID 2796 wrote to memory of 2040 2796 rundll32.exe 32 PID 2796 wrote to memory of 2040 2796 rundll32.exe 32 PID 2796 wrote to memory of 2040 2796 rundll32.exe 32 PID 2796 wrote to memory of 2040 2796 rundll32.exe 32 PID 2040 wrote to memory of 2212 2040 RunDll32.exe 33 PID 2040 wrote to memory of 2212 2040 RunDll32.exe 33 PID 2040 wrote to memory of 2212 2040 RunDll32.exe 33 PID 2040 wrote to memory of 2212 2040 RunDll32.exe 33 PID 2040 wrote to memory of 2212 2040 RunDll32.exe 33 PID 2040 wrote to memory of 2212 2040 RunDll32.exe 33 PID 2040 wrote to memory of 2212 2040 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe"C:\Users\Admin\AppData\Local\Temp\bb330cb65796d9bdefe8c2e81651f639e3de9bdbca20b68fb1db57fd7f9e2938.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\__NTPNP.cpL",2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\__NTPNP.cpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\__NTPNP.cpL",4⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\__NTPNP.cpL",5⤵
- Loads dropped DLL
PID:2212
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5a6ca7ec7b9b2c4542bd0864d73e56ac8
SHA169453e475ceff974d5b594eaa831a75f5a3b3c66
SHA256d5984f348eaec4509032410ccf091602c353d014fe9edd3477e54d41bd25ba67
SHA5124710e56e3e69a962001544770b767b10afa8ddbda4e1b0d4c1166c5ed735119b8b717db573a9f43768e223ee1d0026907e37ee7aa4c3a17db5f061171aa3fd3f
-
Filesize
362KB
MD5e5fd62d8b78cff821c54a20104e5a074
SHA1fbfb2f43ef2ff548e31cc28a288f3b74c210a633
SHA256c68e8a72a732da7c96e7a77269e4b13c489c7abaa6ac0d51e534784183fba9c3
SHA51227d034c0cea5bd86576fa9e9e252d605a5cc3f1aa2398c00c7f9b64ca9cb18d9ccdfe90f91b9c0226165ad01ef674df8e092c8778f961ddd26f3d79212bfc321
-
Filesize
233KB
MD5825f8bda9a4575584d4323d2d04e1b0e
SHA1eba348418d64d69451a6180704feb147b164ce73
SHA256aed6d597cae2b5c550ae6b4cd2cd09143074f33d4dcda8d05f143b96cf164e87
SHA512cd32ed3d000bbdb6f2538797962a457c9152c8b95407e8fec920fc943b75b20bc0749213ef500d53697438dcdf52cfadd711f124b8b936ef0543157d3db2d501
-
Filesize
241KB
MD569dd9c4295d603ed16e6c1a7f8ee1d01
SHA1ba4cbd8895330f665bb0a45d3e3aaad22e9e5500
SHA256077237a0380390494b2373f233ecbcb89bdadc8937a7c44f4db25d40d8f7bb0e
SHA51234dca6231e51c7eaa495ba8bd922863628285dd39741ad4147af32404415c997f8180b86e37f78c3d01a8568e3f0d4d3d9f7db9e0e4d2daec8f433626f1a2385
-
Filesize
254KB
MD5b1d2c0f2f21426c7fea14ce01b7336ef
SHA1df35aa920dc49834e2131641db604e405d071de8
SHA256d389ed8777d604578508e56b20551be9a57d20c08e856c0e9f2c2ce5bbb613e2
SHA51244b03f85c44144580d859c6ce313db995699b68cfeb5536c24a58c27d6e42d77cabec9b7e3b6a711d1059904aa5a57b1b91106ed08db153ede4a3fdb98bba04a
-
Filesize
1.4MB
MD5875dc25913cbcb5413331aaee6b2eb52
SHA1be13b5e70f76ded1f19cec600b254670828fe331
SHA2561cf1b9cf923ef25f7a46bff78e3edd79045efe86e92d264ad63542c38aac6f6e
SHA51243294a4e200eb3de451411eb58b48225e3bf1b92b07ad71a90c9d94acb6c18654bf30e8f05893cfeea56e208e04d526282a8b9dedc2a8d783a21e39e82f603e9
-
Filesize
2.1MB
MD5db6e36f04ccb50b83ee10604f078b969
SHA13fe5e8179094fa754b784b28ac84116087f6d2c4
SHA2563a0a18d09c76f003680e7dcfe964ec42ed76e7c2a5c828529bf7ec82067674c2
SHA512592e17713d35b26328c152bfb07cbd3fe25a3047c404392f3d02d9bb9a1450e9b9ac76eac49a6a90f762258e23ffd85a4a488cd177a1a8088cd9ee98a391c271
-
Filesize
2.7MB
MD57cb50c2345291eb9f59e50b06309235c
SHA1b2a7a5d56284c3fdf5686bed3b57ca65bb147406
SHA25646b7c07baf45daccc69f2b2827dc5514190d7dd913333adfe0f23a9ab6ba25ff
SHA5124748ee2a47e888c7d95cf64bce9c6e2a749b2cfaa03c2263a6e4413f5894a86f2fbe785fd8fa6a8e02e839713b7149e7e6998a05a3ff7f8264e26223db90f8ef
-
Filesize
2.7MB
MD5a77eb8620acf3c72da6c41013a7789a0
SHA1ca67d228eebcb3d93dba7e8803324be7a8260803
SHA2564c2ee239026806bd8f03db69be64696cace21e0a2c120071c1f2a6cdc08fb9f4
SHA512577d61a9ff0607f4cb2b3307ff5b9fbbd9b4591fcefde1504d5bdf8e3e05334aad04aec6fdc97bf97c1aca41c143ed83025d8fe12a6b64bdc6f34fa858c41569