Analysis
-
max time kernel
44s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 18:39
Behavioral task
behavioral1
Sample
f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe
Resource
win10v2004-20221111-en
General
-
Target
f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe
-
Size
546KB
-
MD5
2896fa64fb2ad8f45a27a40b0be41462
-
SHA1
0918f5af9c99aa6cf83d3961900fa7933aeabed3
-
SHA256
f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b
-
SHA512
cb2c8b433331ecd209ba03a0c7d216b2a172b6a73d19cf533718a1b0a6b08f26f284e94c562b6157c64ded74c4de76f46bb814869f6e18fca899baa102782f65
-
SSDEEP
12288:mHXt2ePglfKwx4EMvz9HqGwS5VMo6rffwe1rZ2:AXt2QXmS3uffn1Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1216 4.exe -
resource yara_rule behavioral1/memory/1252-54-0x0000000001000000-0x000000000110A000-memory.dmp vmprotect behavioral1/memory/1252-56-0x0000000001000000-0x000000000110A000-memory.dmp vmprotect behavioral1/memory/1252-57-0x0000000001000000-0x000000000110A000-memory.dmp vmprotect -
Loads dropped DLL 3 IoCs
pid Process 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 1216 4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1252 wrote to memory of 1216 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 28 PID 1252 wrote to memory of 1216 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 28 PID 1252 wrote to memory of 1216 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 28 PID 1252 wrote to memory of 1216 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 28 PID 1252 wrote to memory of 1216 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 28 PID 1252 wrote to memory of 1216 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 28 PID 1252 wrote to memory of 1216 1252 f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe"C:\Users\Admin\AppData\Local\Temp\f55d6185cd5a57c01417886d0eceab86c471556c20daa8a4d16bc3e8fc46378b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1216
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
498KB
MD50e2fa3bd0ac3355b357a88aeb59d422a
SHA1719e44ebb767ca6fad517aaba8e789ab84a697e9
SHA25667f1fc4baf7df31fb76a62920d328dd0e838da0508ba00fd72a8b752fc1618ea
SHA512eabc6280879241e7f5ae94da6015805bae3f68dfdbb76d15a344ac485e6d9018f4044a0ecbb1d528c1676418fad4f691d0c947ebb91da1c0c772449e3adda95b
-
Filesize
498KB
MD50e2fa3bd0ac3355b357a88aeb59d422a
SHA1719e44ebb767ca6fad517aaba8e789ab84a697e9
SHA25667f1fc4baf7df31fb76a62920d328dd0e838da0508ba00fd72a8b752fc1618ea
SHA512eabc6280879241e7f5ae94da6015805bae3f68dfdbb76d15a344ac485e6d9018f4044a0ecbb1d528c1676418fad4f691d0c947ebb91da1c0c772449e3adda95b
-
Filesize
498KB
MD50e2fa3bd0ac3355b357a88aeb59d422a
SHA1719e44ebb767ca6fad517aaba8e789ab84a697e9
SHA25667f1fc4baf7df31fb76a62920d328dd0e838da0508ba00fd72a8b752fc1618ea
SHA512eabc6280879241e7f5ae94da6015805bae3f68dfdbb76d15a344ac485e6d9018f4044a0ecbb1d528c1676418fad4f691d0c947ebb91da1c0c772449e3adda95b
-
Filesize
498KB
MD50e2fa3bd0ac3355b357a88aeb59d422a
SHA1719e44ebb767ca6fad517aaba8e789ab84a697e9
SHA25667f1fc4baf7df31fb76a62920d328dd0e838da0508ba00fd72a8b752fc1618ea
SHA512eabc6280879241e7f5ae94da6015805bae3f68dfdbb76d15a344ac485e6d9018f4044a0ecbb1d528c1676418fad4f691d0c947ebb91da1c0c772449e3adda95b
-
Filesize
498KB
MD50e2fa3bd0ac3355b357a88aeb59d422a
SHA1719e44ebb767ca6fad517aaba8e789ab84a697e9
SHA25667f1fc4baf7df31fb76a62920d328dd0e838da0508ba00fd72a8b752fc1618ea
SHA512eabc6280879241e7f5ae94da6015805bae3f68dfdbb76d15a344ac485e6d9018f4044a0ecbb1d528c1676418fad4f691d0c947ebb91da1c0c772449e3adda95b