Analysis
-
max time kernel
23s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
22-11-2022 14:40
Static task
static1
Behavioral task
behavioral1
Sample
ac006a4066fd3316240b6fe107569209.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac006a4066fd3316240b6fe107569209.exe
Resource
win10v2004-20220901-en
General
-
Target
ac006a4066fd3316240b6fe107569209.exe
-
Size
742KB
-
MD5
ac006a4066fd3316240b6fe107569209
-
SHA1
3a9fbfe82f5d259c36104df4206926d7a0cf82ef
-
SHA256
16975eee0891f39d99601cc61d163911ae9e30aaf194c7f70c67eb02bb66a81e
-
SHA512
c43ec5ff944f350b8582ffdf2dfa4d6e79013bc79ddc8ce4cd783b24609c496d8cc8004ddfb98bc35656c8014131803d7ebb462bd05e45153f289fb13a4a2201
-
SSDEEP
12288:rttTYdmKnGcSacTuDC8vidkVSGdNClgYcbRA3telMHpc1WPiML9B7uH04NqK3:BtTYdpSRj8ksQHelMJc1W/pB7eNL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Sua.exe.pifpid process 944 Sua.exe.pif -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1800 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ac006a4066fd3316240b6fe107569209.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ac006a4066fd3316240b6fe107569209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac006a4066fd3316240b6fe107569209.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Sua.exe.pifpid process 944 Sua.exe.pif 944 Sua.exe.pif 944 Sua.exe.pif -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Sua.exe.pifpid process 944 Sua.exe.pif 944 Sua.exe.pif 944 Sua.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Sua.exe.pifpid process 944 Sua.exe.pif 944 Sua.exe.pif 944 Sua.exe.pif -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
ac006a4066fd3316240b6fe107569209.execmd.execmd.exedescription pid process target process PID 836 wrote to memory of 1040 836 ac006a4066fd3316240b6fe107569209.exe WerFault.exe PID 836 wrote to memory of 1040 836 ac006a4066fd3316240b6fe107569209.exe WerFault.exe PID 836 wrote to memory of 1040 836 ac006a4066fd3316240b6fe107569209.exe WerFault.exe PID 836 wrote to memory of 1040 836 ac006a4066fd3316240b6fe107569209.exe WerFault.exe PID 836 wrote to memory of 1664 836 ac006a4066fd3316240b6fe107569209.exe cmd.exe PID 836 wrote to memory of 1664 836 ac006a4066fd3316240b6fe107569209.exe cmd.exe PID 836 wrote to memory of 1664 836 ac006a4066fd3316240b6fe107569209.exe cmd.exe PID 836 wrote to memory of 1664 836 ac006a4066fd3316240b6fe107569209.exe cmd.exe PID 1664 wrote to memory of 1800 1664 cmd.exe cmd.exe PID 1664 wrote to memory of 1800 1664 cmd.exe cmd.exe PID 1664 wrote to memory of 1800 1664 cmd.exe cmd.exe PID 1664 wrote to memory of 1800 1664 cmd.exe cmd.exe PID 1800 wrote to memory of 1716 1800 cmd.exe findstr.exe PID 1800 wrote to memory of 1716 1800 cmd.exe findstr.exe PID 1800 wrote to memory of 1716 1800 cmd.exe findstr.exe PID 1800 wrote to memory of 1716 1800 cmd.exe findstr.exe PID 1800 wrote to memory of 944 1800 cmd.exe Sua.exe.pif PID 1800 wrote to memory of 944 1800 cmd.exe Sua.exe.pif PID 1800 wrote to memory of 944 1800 cmd.exe Sua.exe.pif PID 1800 wrote to memory of 944 1800 cmd.exe Sua.exe.pif PID 1800 wrote to memory of 388 1800 cmd.exe PING.EXE PID 1800 wrote to memory of 388 1800 cmd.exe PING.EXE PID 1800 wrote to memory of 388 1800 cmd.exe PING.EXE PID 1800 wrote to memory of 388 1800 cmd.exe PING.EXE PID 1664 wrote to memory of 912 1664 cmd.exe PING.EXE PID 1664 wrote to memory of 912 1664 cmd.exe PING.EXE PID 1664 wrote to memory of 912 1664 cmd.exe PING.EXE PID 1664 wrote to memory of 912 1664 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac006a4066fd3316240b6fe107569209.exe"C:\Users\Admin\AppData\Local\Temp\ac006a4066fd3316240b6fe107569209.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeWerFault.exe //////2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Ora.cda & ping -n 5 localhost2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^iUwMLwdQGUrlDeCntUResRJVqLgQgginvUHAyFyHCejmYCZZmUaizzbdkyMZNACaMFOJcwznPpAfFpWbMgdzVqtrbsgZTyUwmUMzOfEbBTalToKwoghnppvMBLjrMzFJgnPKbDJ$" Plasmare.cda4⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sua.exe.pifSua.exe.pif a4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Bel.cdaFilesize
710KB
MD592fcb108844d3e7127dcc7287eb34ad9
SHA132fa7ab353e179415fa9bae033d9a58330e7030d
SHA2565b95309f549121e405f8c45cafbead07348be530d756465306cc325697553946
SHA51254d52174085bfa019bef204a4622c50467ee5c056777e162d27686922edaeba3180460458c1675b4c2f5c4b70d52842d8d35d9acdafb997c71507a844b8f49b1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ora.cdaFilesize
8KB
MD51e556573aab916a0da587d261b72f254
SHA18ac14add8d4092c1bfaa21bf75f158b00f0f2d0c
SHA256a3ad93f8f7feece6c972c7a211ecf8670641cea65eb0fa778e9564691523f22b
SHA512d4f9294b8550c30b4f32b0635a598bd20c15958194e4570827a07b1dd2d9614e7958147338937d606a111ba1b7fdf7e14323259fecf6c4d31096881a5de926f9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Plasmare.cdaFilesize
924KB
MD58fbc8dfd866fcbcc2ddebd5461d21dcb
SHA1a9131b4a3bb23748f61fe01b9e361c9523951a2d
SHA2567f1f6566d5f4cd773d1d8630a72b28df644d5c57f00746c3c542ed5db7d6f114
SHA512fa79500c67ba2ace40cd2c925c33c1c2625a9f99fbed67b2c1806c511106526b46c154104803d13c5e9a0657cb2e785f0f2f9a9cb305d343ba09b86a4c0ac97a
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sua.exe.pifFilesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sua.exe.pifFilesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sua.exe.pifFilesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
memory/388-64-0x0000000000000000-mapping.dmp
-
memory/912-66-0x0000000000000000-mapping.dmp
-
memory/944-62-0x0000000000000000-mapping.dmp
-
memory/944-65-0x0000000075C81000-0x0000000075C83000-memory.dmpFilesize
8KB
-
memory/1040-54-0x0000000000000000-mapping.dmp
-
memory/1664-55-0x0000000000000000-mapping.dmp
-
memory/1716-58-0x0000000000000000-mapping.dmp
-
memory/1800-57-0x0000000000000000-mapping.dmp