Analysis
-
max time kernel
95s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 09:56
Behavioral task
behavioral1
Sample
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe
Resource
win10v2004-20220812-en
General
-
Target
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe
-
Size
160KB
-
MD5
806880efba74530858b2b00c59211768
-
SHA1
4f943d4db9d98c4e2392b4d36d877292affbdd91
-
SHA256
bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334
-
SHA512
dc71eb7a67f81d29c36ddfe1bb0de6ed95425a5d2d3e2ff582bbff7d3e5ba3000a0fd38d470e361eee68c3defcf8265589357e5c3c12b1ee21680a799cdff070
-
SSDEEP
3072:Hgrr1iDIGMl/K3HzB6Hh8gg6+24v4EqJwepqxpH9K7lxyyNzNfgZ:HqKIHKDB27g6+JI5pKUQr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4544 1.EXE -
resource yara_rule behavioral2/memory/4604-132-0x0000000001000000-0x0000000001042000-memory.dmp upx behavioral2/memory/4604-133-0x0000000001000000-0x0000000001042000-memory.dmp upx behavioral2/memory/4604-134-0x0000000001000000-0x0000000001042000-memory.dmp upx behavioral2/memory/4604-141-0x0000000001000000-0x0000000001042000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4544 1.EXE 4544 1.EXE 4544 1.EXE 4544 1.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4604 wrote to memory of 4544 4604 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 82 PID 4604 wrote to memory of 4544 4604 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 82 PID 4604 wrote to memory of 4544 4604 bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe 82 PID 4544 wrote to memory of 3000 4544 1.EXE 50 PID 4544 wrote to memory of 3000 4544 1.EXE 50 PID 4544 wrote to memory of 3000 4544 1.EXE 50 PID 4544 wrote to memory of 3000 4544 1.EXE 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe"C:\Users\Admin\AppData\Local\Temp\bad4c4249f0b49ada95339e27ab657de949e5e5d5aaa99c43e3ab6d91b72a334.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.EXE3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
56KB
MD5409a40d73ca6ee5b490147d9d26daddd
SHA115dd83ded02e54912afa9ca54632b4aca5947682
SHA2569851ebc360f547fa8c9dc39ccac6e0a11f90ff28b437329621a572f0691f51a4
SHA512f884bc719d15fc45fb5f9b787cf359ce112a4d1222de3111b421092fb4ca0a981058ef2d374394f9944cdd4e6946404520b29161fa533f9029786e530c4ae9f8
-
Filesize
56KB
MD5409a40d73ca6ee5b490147d9d26daddd
SHA115dd83ded02e54912afa9ca54632b4aca5947682
SHA2569851ebc360f547fa8c9dc39ccac6e0a11f90ff28b437329621a572f0691f51a4
SHA512f884bc719d15fc45fb5f9b787cf359ce112a4d1222de3111b421092fb4ca0a981058ef2d374394f9944cdd4e6946404520b29161fa533f9029786e530c4ae9f8