Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 10:16
Static task
static1
Behavioral task
behavioral1
Sample
d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe
Resource
win10v2004-20220812-en
General
-
Target
d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe
-
Size
183KB
-
MD5
1c19dbbde0b0dd7c5d4d90c26363330c
-
SHA1
45fe06938193d95795ff296b4e47ffd02ae8b303
-
SHA256
d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f
-
SHA512
22b94f228dff470d1273066faaf981f792e72ffdd95ec0ccc0455ea427575d1d6eaa3582208610be24ba289ede8e93635e647124449779ebdd7e591bba20f41d
-
SSDEEP
3072:mzW+DiW9iLo+GnHk5EBagqRBINsDoASqoGTzqcQ6zaxWYX6RAfR:hKELo7NHiYsDoANxQ62xWzAfR
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3020 server.exe 4900 server.exe -
resource yara_rule behavioral2/files/0x0006000000022e0c-133.dat upx behavioral2/files/0x0006000000022e0c-134.dat upx behavioral2/memory/3020-135-0x0000000000400000-0x0000000000438000-memory.dmp upx behavioral2/files/0x0006000000022e0c-140.dat upx behavioral2/memory/3020-145-0x0000000000400000-0x0000000000438000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3020 set thread context of 4900 3020 server.exe 82 PID 3020 set thread context of 0 3020 server.exe PID 3020 set thread context of 0 3020 server.exe PID 3020 set thread context of 0 3020 server.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4900 server.exe 4900 server.exe 4900 server.exe 4900 server.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3020 server.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4952 wrote to memory of 3020 4952 d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe 81 PID 4952 wrote to memory of 3020 4952 d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe 81 PID 4952 wrote to memory of 3020 4952 d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe 81 PID 3020 wrote to memory of 4900 3020 server.exe 82 PID 3020 wrote to memory of 4900 3020 server.exe 82 PID 3020 wrote to memory of 4900 3020 server.exe 82 PID 3020 wrote to memory of 4900 3020 server.exe 82 PID 3020 wrote to memory of 4900 3020 server.exe 82 PID 3020 wrote to memory of 4900 3020 server.exe 82 PID 3020 wrote to memory of 4900 3020 server.exe 82 PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 3020 wrote to memory of 0 3020 server.exe PID 4900 wrote to memory of 2456 4900 server.exe 39 PID 4900 wrote to memory of 2456 4900 server.exe 39 PID 4900 wrote to memory of 2456 4900 server.exe 39 PID 4900 wrote to memory of 2456 4900 server.exe 39
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe"C:\Users\Admin\AppData\Local\Temp\d158361da75771187f5a05578de4b22e32122681c4b9d602e796f4b957cc1f5f.exe"2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4900
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD552f056e11cac14f34db785723540dd83
SHA17eebf1f2419589253829d9edd8e4139721bde28f
SHA25659e00b2457ca100b2b1dd53dba98b083043917a377e2597f1d20f78d22249744
SHA512bfbb458d3bb637c7bb9cb35e6ec32b7214726f4d991a4555c6ff863b339d2df4428e3be833ad9206778ebf703487c8094cb27a1e2792f70b7ef50a1bd9b3c802
-
Filesize
125KB
MD552f056e11cac14f34db785723540dd83
SHA17eebf1f2419589253829d9edd8e4139721bde28f
SHA25659e00b2457ca100b2b1dd53dba98b083043917a377e2597f1d20f78d22249744
SHA512bfbb458d3bb637c7bb9cb35e6ec32b7214726f4d991a4555c6ff863b339d2df4428e3be833ad9206778ebf703487c8094cb27a1e2792f70b7ef50a1bd9b3c802
-
Filesize
125KB
MD552f056e11cac14f34db785723540dd83
SHA17eebf1f2419589253829d9edd8e4139721bde28f
SHA25659e00b2457ca100b2b1dd53dba98b083043917a377e2597f1d20f78d22249744
SHA512bfbb458d3bb637c7bb9cb35e6ec32b7214726f4d991a4555c6ff863b339d2df4428e3be833ad9206778ebf703487c8094cb27a1e2792f70b7ef50a1bd9b3c802