Analysis
-
max time kernel
108s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe
Resource
win10v2004-20220812-en
General
-
Target
9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe
-
Size
277KB
-
MD5
922b5441bfe0e1ca82dea43422b364fd
-
SHA1
78cca8fee6129d2b88592178c5a092072d6f5401
-
SHA256
9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874
-
SHA512
e308ba5a17e5f0542c8e0f972c7eccd943b9db21404067ddaa698566f721b3af48dc7bb39f2afd0c4dbdf75f16893a147260fca9664b656648e9df998d79ea08
-
SSDEEP
6144:WlFq4VAyuwkK9afJ8Qn0WPP1o5G9gxToJgJCY+AzBlkitfqqK8SlmIqy1GJ:WlFzVdZk+afWaQG9MToiJC1Aw0LyUJ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4056 0.exe 4352 0.exe 2264 0.exe -
resource yara_rule behavioral2/memory/4352-139-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/4352-143-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/4352-145-0x0000000000400000-0x0000000000472000-memory.dmp upx behavioral2/memory/4352-152-0x0000000000400000-0x0000000000472000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4056 set thread context of 4352 4056 0.exe 84 PID 4056 set thread context of 0 4056 0.exe PID 4352 set thread context of 2264 4352 0.exe 85 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4056 0.exe 4352 0.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4780 wrote to memory of 4056 4780 9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe 81 PID 4780 wrote to memory of 4056 4780 9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe 81 PID 4780 wrote to memory of 4056 4780 9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe 81 PID 4056 wrote to memory of 4352 4056 0.exe 84 PID 4056 wrote to memory of 4352 4056 0.exe 84 PID 4056 wrote to memory of 4352 4056 0.exe 84 PID 4056 wrote to memory of 4352 4056 0.exe 84 PID 4056 wrote to memory of 4352 4056 0.exe 84 PID 4056 wrote to memory of 4352 4056 0.exe 84 PID 4056 wrote to memory of 4352 4056 0.exe 84 PID 4056 wrote to memory of 4352 4056 0.exe 84 PID 4056 wrote to memory of 0 4056 0.exe PID 4056 wrote to memory of 0 4056 0.exe PID 4056 wrote to memory of 0 4056 0.exe PID 4056 wrote to memory of 0 4056 0.exe PID 4056 wrote to memory of 0 4056 0.exe PID 4352 wrote to memory of 2264 4352 0.exe 85 PID 4352 wrote to memory of 2264 4352 0.exe 85 PID 4352 wrote to memory of 2264 4352 0.exe 85 PID 4352 wrote to memory of 2264 4352 0.exe 85 PID 4352 wrote to memory of 2264 4352 0.exe 85 PID 4352 wrote to memory of 2264 4352 0.exe 85 PID 4352 wrote to memory of 2264 4352 0.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe"C:\Users\Admin\AppData\Local\Temp\9f6ea5446d0c1458267f2821b7b50816b0de77065cbcff741aebab4d6922d874.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\0.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\0.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\0.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\0.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\0.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\0.exe"4⤵
- Executes dropped EXE
PID:2264
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
652KB
MD5d47adacf5400fd18d235f856da9ac7cd
SHA1337d3d98207634140ff1c7ac2084e6672bc26bc7
SHA256f063593e8efe44f185f13d3f04d78739533fc65c846d05043dba9959577ac6f4
SHA512c16a6ed00c9a40c0b5d5ed6683a3eedf06752fdbf057b31c72cd51ad55447b368f5483803bd9951ba002ee5c4c791bd39079f1804285f78b5ce1bf4b0207cafb
-
Filesize
652KB
MD5d47adacf5400fd18d235f856da9ac7cd
SHA1337d3d98207634140ff1c7ac2084e6672bc26bc7
SHA256f063593e8efe44f185f13d3f04d78739533fc65c846d05043dba9959577ac6f4
SHA512c16a6ed00c9a40c0b5d5ed6683a3eedf06752fdbf057b31c72cd51ad55447b368f5483803bd9951ba002ee5c4c791bd39079f1804285f78b5ce1bf4b0207cafb
-
Filesize
652KB
MD5d47adacf5400fd18d235f856da9ac7cd
SHA1337d3d98207634140ff1c7ac2084e6672bc26bc7
SHA256f063593e8efe44f185f13d3f04d78739533fc65c846d05043dba9959577ac6f4
SHA512c16a6ed00c9a40c0b5d5ed6683a3eedf06752fdbf057b31c72cd51ad55447b368f5483803bd9951ba002ee5c4c791bd39079f1804285f78b5ce1bf4b0207cafb
-
Filesize
652KB
MD5d47adacf5400fd18d235f856da9ac7cd
SHA1337d3d98207634140ff1c7ac2084e6672bc26bc7
SHA256f063593e8efe44f185f13d3f04d78739533fc65c846d05043dba9959577ac6f4
SHA512c16a6ed00c9a40c0b5d5ed6683a3eedf06752fdbf057b31c72cd51ad55447b368f5483803bd9951ba002ee5c4c791bd39079f1804285f78b5ce1bf4b0207cafb