Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe
Resource
win10-20231220-en
General
-
Target
336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe
-
Size
1.9MB
-
MD5
64af03328c64e55600d79b3751afeb98
-
SHA1
fd2aa540f01e58083732a207216decf92dde7068
-
SHA256
336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94
-
SHA512
b1438b20dbf15f3c750927a4680c5acb1878a0b69c42525c126c47fa908e8d373736269cfa913cfb0acb10e4ebb8675e923f577f6c066a7fc430e5da44a861b1
-
SSDEEP
49152:anGImUl9Ljt8+fC0uRjKPjL/g6EYUuBnrURHPvqqx306:aGIl93JfC9RjKPg6jBU1306
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 2740 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe 2612 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2268 2324 336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe 28 PID 2324 wrote to memory of 2268 2324 336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe 28 PID 2324 wrote to memory of 2268 2324 336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe 28 PID 2324 wrote to memory of 2268 2324 336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe 28 PID 2268 wrote to memory of 2740 2268 control.exe 29 PID 2268 wrote to memory of 2740 2268 control.exe 29 PID 2268 wrote to memory of 2740 2268 control.exe 29 PID 2268 wrote to memory of 2740 2268 control.exe 29 PID 2268 wrote to memory of 2740 2268 control.exe 29 PID 2268 wrote to memory of 2740 2268 control.exe 29 PID 2268 wrote to memory of 2740 2268 control.exe 29 PID 2740 wrote to memory of 2600 2740 rundll32.exe 30 PID 2740 wrote to memory of 2600 2740 rundll32.exe 30 PID 2740 wrote to memory of 2600 2740 rundll32.exe 30 PID 2740 wrote to memory of 2600 2740 rundll32.exe 30 PID 2600 wrote to memory of 2612 2600 RunDll32.exe 31 PID 2600 wrote to memory of 2612 2600 RunDll32.exe 31 PID 2600 wrote to memory of 2612 2600 RunDll32.exe 31 PID 2600 wrote to memory of 2612 2600 RunDll32.exe 31 PID 2600 wrote to memory of 2612 2600 RunDll32.exe 31 PID 2600 wrote to memory of 2612 2600 RunDll32.exe 31 PID 2600 wrote to memory of 2612 2600 RunDll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe"C:\Users\Admin\AppData\Local\Temp\336ac35f2f093039d91daf6ccd9661a2ed5bcf3ddfbd84e5b5ee680e99443a94.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\1KiT02.cpL",2⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\1KiT02.cpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\1KiT02.cpL",4⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\1KiT02.cpL",5⤵
- Loads dropped DLL
PID:2612
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD507797b22d86bff5157b07451faa19ae8
SHA1df054a961c55dcb131ee7bb7dd5eb4447883f282
SHA256226debb930fc1deb43f6159995eefdef15eeebf7bd86bd9c482a521399f5336b
SHA512810e5161ba440e88c70e8392efcdfbadbc0926bc9a4f4c7e5ff68e3e85363c327bc87a2a37cabea3dd8b27d8c67608e3d7c8bdded0296d52f3a3250958cc15e7