Analysis
-
max time kernel
98s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 22:14
Static task
static1
Behavioral task
behavioral1
Sample
df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe
Resource
win10v2004-20220812-en
General
-
Target
df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe
-
Size
252KB
-
MD5
6194370c4f0d30f4b4a617aaeb03e066
-
SHA1
9021444550b07341d35ecfaa6cc87e346ea986cf
-
SHA256
df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9
-
SHA512
f0939168c4629e61ad74d4e8c1698d863ab888d15c7a5e725c2fa8eda7b6d8c0b30ad442f0fc35a20d70c42bd23ca03de4130016b603abf4f88196260867b9fd
-
SSDEEP
6144:9FS4H7t3Pzj/WDeqWJ2SibWmNjOYcDw8gYtDd83Ejfi2HTNcu:9BpPv1dQFSV4K+3CHRH
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3164 server.exe -
Loads dropped DLL 2 IoCs
pid Process 4336 df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe 3164 server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmimgr32.dl_ df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe File created C:\Windows\SysWOW64\wmimgr32.dll df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4336 df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3164 4336 df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe 82 PID 4336 wrote to memory of 3164 4336 df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe 82 PID 4336 wrote to memory of 3164 4336 df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe"C:\Users\Admin\AppData\Local\Temp\df3f832d5e09b3400c26d23bac177ede194eb5c27fcfaeab3f29b3ed03a492b9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3164
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5eef3574b100e2621bb398716b56bb383
SHA121f74faaa9b0d4086c976af384c3c0729cd6f1e0
SHA2563340f2499b0a75b565e170c312694be7fe56e702ece087def05c7c333e8d3dd1
SHA51234d53669e4bb0a39e88d0351890a801be0d095dc9b22e542685921d0c4f5a562c18f1c078ed69175343e6286bb010c14a34f6dacd9109b3e50b786b9783ecccc
-
Filesize
74KB
MD5eef3574b100e2621bb398716b56bb383
SHA121f74faaa9b0d4086c976af384c3c0729cd6f1e0
SHA2563340f2499b0a75b565e170c312694be7fe56e702ece087def05c7c333e8d3dd1
SHA51234d53669e4bb0a39e88d0351890a801be0d095dc9b22e542685921d0c4f5a562c18f1c078ed69175343e6286bb010c14a34f6dacd9109b3e50b786b9783ecccc
-
Filesize
23KB
MD59ebb3e4fc0c32524ba4098e214a06150
SHA141d0964a70edc0875ff9a8091b6911e18684e1ed
SHA256f183002d0c6412dc694b580e0b33194766921415e77f713d46cb29dac6ae196d
SHA512d7338292e03fd374fec772787e7561a6d6e9ca0b108cf4b6e9f79647bf0f64960ec78979e986f8bfa9874d907ecacca81183faacdd350e890c0dab02ca50298a
-
Filesize
23KB
MD59ebb3e4fc0c32524ba4098e214a06150
SHA141d0964a70edc0875ff9a8091b6911e18684e1ed
SHA256f183002d0c6412dc694b580e0b33194766921415e77f713d46cb29dac6ae196d
SHA512d7338292e03fd374fec772787e7561a6d6e9ca0b108cf4b6e9f79647bf0f64960ec78979e986f8bfa9874d907ecacca81183faacdd350e890c0dab02ca50298a
-
Filesize
23KB
MD59ebb3e4fc0c32524ba4098e214a06150
SHA141d0964a70edc0875ff9a8091b6911e18684e1ed
SHA256f183002d0c6412dc694b580e0b33194766921415e77f713d46cb29dac6ae196d
SHA512d7338292e03fd374fec772787e7561a6d6e9ca0b108cf4b6e9f79647bf0f64960ec78979e986f8bfa9874d907ecacca81183faacdd350e890c0dab02ca50298a