Analysis
-
max time kernel
181s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2022, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe
Resource
win10v2004-20220812-en
General
-
Target
526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe
-
Size
848KB
-
MD5
6f9bde6960f97b503b7c76cb727770cd
-
SHA1
767bc290bf4fb369fcc7553d78f8c23dbe512205
-
SHA256
526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403
-
SHA512
0ec861db946c4533b7f3c2ffec6c073f8bc0d3408474406465ac726e3d32393b3a7f110e0686a71fc3335885b78c643645bdbb58a89ebd460ef846776f39a257
-
SSDEEP
24576:440++sj6vOQ5uVq1gpLiV+vclI+St8l36RD3:440g6l5upLiYclAt8l3E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 884 server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\VERSION.dll 526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe File opened for modification C:\Windows\SysWOW64\ADVAPI32.dll 526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe File opened for modification C:\Windows\SysWOW64\COMCTL32.dll 526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 884 server.exe 884 server.exe 884 server.exe 884 server.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3736 wrote to memory of 884 3736 526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe 81 PID 3736 wrote to memory of 884 3736 526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe 81 PID 3736 wrote to memory of 884 3736 526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe 81 PID 884 wrote to memory of 1040 884 server.exe 36 PID 884 wrote to memory of 1040 884 server.exe 36 PID 884 wrote to memory of 1040 884 server.exe 36 PID 884 wrote to memory of 1040 884 server.exe 36 PID 884 wrote to memory of 1040 884 server.exe 36 PID 884 wrote to memory of 1040 884 server.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe"C:\Users\Admin\AppData\Local\Temp\526c8777d5b282fc0624b289b08a2b9c17f6b1aa3ccb7b9616b0ef7852081403.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:884
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD56f8c474fd7ce012eb4adf3fbfd28d08e
SHA1ad3c02291f2b5995c3c3657e4dc330ae692ecbeb
SHA2560d1f7323734fad97096545a7ea3622ac5dc7a891932566c3b5f50571c15d1ca7
SHA512780881e8033f7a7fe04c879e3073319211cf233d6c76b026c913cba09b1434a42555b55f66901e9e30698fd876f1ada95b93412d0a2bba3749895265d2c2790e
-
Filesize
28KB
MD56f8c474fd7ce012eb4adf3fbfd28d08e
SHA1ad3c02291f2b5995c3c3657e4dc330ae692ecbeb
SHA2560d1f7323734fad97096545a7ea3622ac5dc7a891932566c3b5f50571c15d1ca7
SHA512780881e8033f7a7fe04c879e3073319211cf233d6c76b026c913cba09b1434a42555b55f66901e9e30698fd876f1ada95b93412d0a2bba3749895265d2c2790e