Analysis
-
max time kernel
129s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:12
Static task
static1
Behavioral task
behavioral1
Sample
f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe
Resource
win10v2004-20221111-en
General
-
Target
f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe
-
Size
131KB
-
MD5
40ac16daa9c2f2b8f82b036938b2412a
-
SHA1
0cc85169d156bd25dab370a2f1bf712f3164ab49
-
SHA256
f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1
-
SHA512
5cb7918fb1132a8c45dddbdc65db3d8b1fd2db5a3f95f2b208271c5efbbb40f7509c2c248a5ae49c3c8f9be3b4d95fe64437898a12119cf0c3a3be8f57bd4f84
-
SSDEEP
3072:lEH+GiEs2SMylNOjyFbxJa5emEIr9E9njkKr3McVmySRyE6Uiowf5:lsehzRFW9rC5vV/SRS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
FLASH.EXEpid process 864 FLASH.EXE -
Loads dropped DLL 9 IoCs
Processes:
f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exeFLASH.EXEWerFault.exepid process 1372 f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe 864 FLASH.EXE 864 FLASH.EXE 864 FLASH.EXE 1272 WerFault.exe 1272 WerFault.exe 1272 WerFault.exe 1272 WerFault.exe 1272 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1272 864 WerFault.exe FLASH.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exeFLASH.EXEdescription pid process target process PID 1372 wrote to memory of 864 1372 f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe FLASH.EXE PID 1372 wrote to memory of 864 1372 f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe FLASH.EXE PID 1372 wrote to memory of 864 1372 f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe FLASH.EXE PID 1372 wrote to memory of 864 1372 f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe FLASH.EXE PID 1372 wrote to memory of 864 1372 f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe FLASH.EXE PID 1372 wrote to memory of 864 1372 f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe FLASH.EXE PID 1372 wrote to memory of 864 1372 f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe FLASH.EXE PID 864 wrote to memory of 1272 864 FLASH.EXE WerFault.exe PID 864 wrote to memory of 1272 864 FLASH.EXE WerFault.exe PID 864 wrote to memory of 1272 864 FLASH.EXE WerFault.exe PID 864 wrote to memory of 1272 864 FLASH.EXE WerFault.exe PID 864 wrote to memory of 1272 864 FLASH.EXE WerFault.exe PID 864 wrote to memory of 1272 864 FLASH.EXE WerFault.exe PID 864 wrote to memory of 1272 864 FLASH.EXE WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe"C:\Users\Admin\AppData\Local\Temp\f0b3fa7def9c4e34fd711d5f82bee8a252eb2e49bb2a032e3ebbf0a0ce45e4e1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FLASH.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 864 -s 2683⤵
- Loads dropped DLL
- Program crash
PID:1272
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7
-
Filesize
83KB
MD595e1f5f720d02aad94f20f057513589c
SHA111af5c0af38fa3c69d191b4f617f07f42980a5db
SHA2562775c0558739a174c21ec9c27a8ebc2f851bd27467c13b11ba65fb1307179205
SHA512bc6dab455558869175c11ce123d571bbb4eb9de0c971ddff72fc37f0e687fa32ee2711f810dba190ed9403316d442ed52ef6ecc0ad281bb7fadd0ef2a9f7bce7