Analysis
-
max time kernel
47s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe
Resource
win10v2004-20221111-en
General
-
Target
91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe
-
Size
248KB
-
MD5
c2cfedb51cdb805c600985af29e13918
-
SHA1
89f4eadb77ece4b1da90faa12da466af1e5f3276
-
SHA256
91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62
-
SHA512
31df38fe3323fcb526a851c945c31a56fba54aff2b74581c713007185114078f6324f7eb011e5a8c59ffd052cbaf94b4dec0a1752aaabb26a34dddfe1b01c4fe
-
SSDEEP
6144:wv8OCXmikdlT6vg1ozZhd08bLjHWkg64Htf7YRU0OwFf3Uot5:CmXSdlGqozZkmHWkgDsFOwRH5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2008 1.exe -
Loads dropped DLL 3 IoCs
pid Process 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 2008 1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2008 1.exe 2008 1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2008 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 28 PID 1672 wrote to memory of 2008 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 28 PID 1672 wrote to memory of 2008 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 28 PID 1672 wrote to memory of 2008 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 28 PID 1672 wrote to memory of 2008 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 28 PID 1672 wrote to memory of 2008 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 28 PID 1672 wrote to memory of 2008 1672 91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe 28 PID 2008 wrote to memory of 1224 2008 1.exe 5 PID 2008 wrote to memory of 1224 2008 1.exe 5 PID 2008 wrote to memory of 1224 2008 1.exe 5 PID 2008 wrote to memory of 1224 2008 1.exe 5
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe"C:\Users\Admin\AppData\Local\Temp\91609cc26eb99f12c511a60144456c148cf2e5219882c36dcf403ec9cfa23d62.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ecd3f3b4e259d27b7161ac1c38fd592d
SHA1b10155fcf11ec48717ef3ed94d66e77efe418b37
SHA25644f39488ed0fdf8e6b5747a471bea6716045adfea2bb327af8d8bbd55d8c8319
SHA5124c4c743d5eb5c80af895f150a696ee7840380bacf52c28545b4196608b2b0d6b6828fbba3e0fa1b163caf4bb1c0eecc645545cf90891401f952929ca569ded08
-
Filesize
31KB
MD5ecd3f3b4e259d27b7161ac1c38fd592d
SHA1b10155fcf11ec48717ef3ed94d66e77efe418b37
SHA25644f39488ed0fdf8e6b5747a471bea6716045adfea2bb327af8d8bbd55d8c8319
SHA5124c4c743d5eb5c80af895f150a696ee7840380bacf52c28545b4196608b2b0d6b6828fbba3e0fa1b163caf4bb1c0eecc645545cf90891401f952929ca569ded08
-
Filesize
31KB
MD5ecd3f3b4e259d27b7161ac1c38fd592d
SHA1b10155fcf11ec48717ef3ed94d66e77efe418b37
SHA25644f39488ed0fdf8e6b5747a471bea6716045adfea2bb327af8d8bbd55d8c8319
SHA5124c4c743d5eb5c80af895f150a696ee7840380bacf52c28545b4196608b2b0d6b6828fbba3e0fa1b163caf4bb1c0eecc645545cf90891401f952929ca569ded08
-
Filesize
31KB
MD5ecd3f3b4e259d27b7161ac1c38fd592d
SHA1b10155fcf11ec48717ef3ed94d66e77efe418b37
SHA25644f39488ed0fdf8e6b5747a471bea6716045adfea2bb327af8d8bbd55d8c8319
SHA5124c4c743d5eb5c80af895f150a696ee7840380bacf52c28545b4196608b2b0d6b6828fbba3e0fa1b163caf4bb1c0eecc645545cf90891401f952929ca569ded08
-
Filesize
31KB
MD5ecd3f3b4e259d27b7161ac1c38fd592d
SHA1b10155fcf11ec48717ef3ed94d66e77efe418b37
SHA25644f39488ed0fdf8e6b5747a471bea6716045adfea2bb327af8d8bbd55d8c8319
SHA5124c4c743d5eb5c80af895f150a696ee7840380bacf52c28545b4196608b2b0d6b6828fbba3e0fa1b163caf4bb1c0eecc645545cf90891401f952929ca569ded08