Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:47
Static task
static1
Behavioral task
behavioral1
Sample
76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe
Resource
win10v2004-20220812-en
General
-
Target
76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe
-
Size
119KB
-
MD5
c28c6697c8f8600e685f654fc2a4d93c
-
SHA1
cb18df976406a5fb05d2dde781802bbc96fbf449
-
SHA256
76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703
-
SHA512
e294f3ade6aecc52ad77e4e256533d5d4a47e13e0182f127fc872585865fe2e366f4dea1f171f63c25c1d1418607d5d471e765370d6f8512ae7e2ea836eb838c
-
SSDEEP
3072:2i9LGd2q6kfXlSO5CRp3uCoIMiJS7Weh4Gec9:XNO+kfXMpLtRJS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
server.exepid process 4628 server.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
server.exepid process 4628 server.exe 4628 server.exe 4628 server.exe 4628 server.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exeserver.exedescription pid process target process PID 4648 wrote to memory of 4628 4648 76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe server.exe PID 4648 wrote to memory of 4628 4648 76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe server.exe PID 4648 wrote to memory of 4628 4648 76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe server.exe PID 4628 wrote to memory of 2556 4628 server.exe Explorer.EXE PID 4628 wrote to memory of 2556 4628 server.exe Explorer.EXE PID 4628 wrote to memory of 2556 4628 server.exe Explorer.EXE PID 4628 wrote to memory of 2556 4628 server.exe Explorer.EXE PID 4628 wrote to memory of 2556 4628 server.exe Explorer.EXE PID 4628 wrote to memory of 2556 4628 server.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe"C:\Users\Admin\AppData\Local\Temp\76834deab057b07958e3b05db9bf9ecafca1345c5a41bc37c895599eee7e5703.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD59c14b6bd24a0634f52e7878326f7350d
SHA1c5468a61b3ea97ba8309162282bfd004df35047e
SHA256013b8178c495b9d02640a6b657fa4995a7e29d8292a56c34b529e7dabe70922b
SHA5128a5d54e790c3c96c197026c07c851389b44a77a1008f129bb1690080708f562b6ac0726982c1110d96c00227ef20181f8749e20ba91da2c6d62371b2a09f8df6
-
Filesize
48KB
MD59c14b6bd24a0634f52e7878326f7350d
SHA1c5468a61b3ea97ba8309162282bfd004df35047e
SHA256013b8178c495b9d02640a6b657fa4995a7e29d8292a56c34b529e7dabe70922b
SHA5128a5d54e790c3c96c197026c07c851389b44a77a1008f129bb1690080708f562b6ac0726982c1110d96c00227ef20181f8749e20ba91da2c6d62371b2a09f8df6