Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 09:56
Behavioral task
behavioral1
Sample
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe
Resource
win10v2004-20220812-en
General
-
Target
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe
-
Size
160KB
-
MD5
806880efba74530858b2b00c59211768
-
SHA1
4f943d4db9d98c4e2392b4d36d877292affbdd91
-
SHA256
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334
-
SHA512
dc71eb7a67f81d29c36ddfe1bb0de6ed95425a5d2d3e2ff582bbff7d3e5ba3000a0fd38d470e361eee68c3defcf8265589357e5c3c12b1ee21680a799cdff070
-
SSDEEP
3072:Hgrr1iDIGMl/K3HzB6Hh8gg6+24v4EqJwepqxpH9K7lxyyNzNfgZ:HqKIHKDB27g6+JI5pKUQr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1516 1.EXE -
resource yara_rule behavioral1/memory/1456-62-0x0000000001000000-0x0000000001042000-memory.dmp upx behavioral1/memory/1456-71-0x0000000001000000-0x0000000001042000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 1516 1.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1516 1.EXE 1516 1.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1516 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 26 PID 1456 wrote to memory of 1516 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 26 PID 1456 wrote to memory of 1516 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 26 PID 1456 wrote to memory of 1516 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 26 PID 1456 wrote to memory of 1516 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 26 PID 1456 wrote to memory of 1516 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 26 PID 1456 wrote to memory of 1516 1456 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 26 PID 1516 wrote to memory of 1360 1516 1.EXE 15 PID 1516 wrote to memory of 1360 1516 1.EXE 15 PID 1516 wrote to memory of 1360 1516 1.EXE 15 PID 1516 wrote to memory of 1360 1516 1.EXE 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe"C:\Users\Admin\AppData\Local\Temp\bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1516
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5409a40d73ca6ee5b490147d9d26daddd
SHA115dd83ded02e54912afa9ca54632b4aca5947682
SHA2569851ebc360f547fa8c9dc39ccac6e0a11f90ff28b437329621a572f0691f51a4
SHA512f884bc719d15fc45fb5f9b787cf359ce112a4d1222de3111b421092fb4ca0a981058ef2d374394f9944cdd4e6946404520b29161fa533f9029786e530c4ae9f8
-
Filesize
56KB
MD5409a40d73ca6ee5b490147d9d26daddd
SHA115dd83ded02e54912afa9ca54632b4aca5947682
SHA2569851ebc360f547fa8c9dc39ccac6e0a11f90ff28b437329621a572f0691f51a4
SHA512f884bc719d15fc45fb5f9b787cf359ce112a4d1222de3111b421092fb4ca0a981058ef2d374394f9944cdd4e6946404520b29161fa533f9029786e530c4ae9f8
-
Filesize
56KB
MD5409a40d73ca6ee5b490147d9d26daddd
SHA115dd83ded02e54912afa9ca54632b4aca5947682
SHA2569851ebc360f547fa8c9dc39ccac6e0a11f90ff28b437329621a572f0691f51a4
SHA512f884bc719d15fc45fb5f9b787cf359ce112a4d1222de3111b421092fb4ca0a981058ef2d374394f9944cdd4e6946404520b29161fa533f9029786e530c4ae9f8
-
Filesize
56KB
MD5409a40d73ca6ee5b490147d9d26daddd
SHA115dd83ded02e54912afa9ca54632b4aca5947682
SHA2569851ebc360f547fa8c9dc39ccac6e0a11f90ff28b437329621a572f0691f51a4
SHA512f884bc719d15fc45fb5f9b787cf359ce112a4d1222de3111b421092fb4ca0a981058ef2d374394f9944cdd4e6946404520b29161fa533f9029786e530c4ae9f8
-
Filesize
56KB
MD5409a40d73ca6ee5b490147d9d26daddd
SHA115dd83ded02e54912afa9ca54632b4aca5947682
SHA2569851ebc360f547fa8c9dc39ccac6e0a11f90ff28b437329621a572f0691f51a4
SHA512f884bc719d15fc45fb5f9b787cf359ce112a4d1222de3111b421092fb4ca0a981058ef2d374394f9944cdd4e6946404520b29161fa533f9029786e530c4ae9f8