Analysis
-
max time kernel
287s -
max time network
295s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2023 14:09
Static task
static1
Behavioral task
behavioral1
Sample
503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe
Resource
win10v2004-20221111-en
General
-
Target
503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe
-
Size
781KB
-
MD5
12140265e812756acf32e1a81774f77a
-
SHA1
3616d86bd9e6d4cf51dca68135da81736766f0dd
-
SHA256
503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34
-
SHA512
97471ad4b21dc70888bf05c62a1a961216eeba34eaae1b3da54e618561e72ab5288a2490064cf5fd37bb3aa579b9f3f7ca926c90e5ef952bbcaa91f5fe3b9aa9
-
SSDEEP
12288:vMr2y90qgFFukn/Tm7R8X84BUBZlCa1nhgVhWRdApDW/zR5/XZUranwqUFO:hyLa1/Tm7ROutOPwd5/pU+nwqUQ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 528 vct58.exe 3848 vta85.exe 3080 dup98.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vct58.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vct58.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce vta85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" vta85.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3412 wrote to memory of 528 3412 503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe 80 PID 3412 wrote to memory of 528 3412 503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe 80 PID 3412 wrote to memory of 528 3412 503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe 80 PID 528 wrote to memory of 3848 528 vct58.exe 81 PID 528 wrote to memory of 3848 528 vct58.exe 81 PID 528 wrote to memory of 3848 528 vct58.exe 81 PID 3848 wrote to memory of 3080 3848 vta85.exe 82 PID 3848 wrote to memory of 3080 3848 vta85.exe 82 PID 3848 wrote to memory of 3080 3848 vta85.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe"C:\Users\Admin\AppData\Local\Temp\503e6dd99a92cd5b6045e37fde6626c219d9466b534906b7ddccb729d91b2f34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vct58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vct58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vta85.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vta85.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dup98.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dup98.exe4⤵
- Executes dropped EXE
PID:3080
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
677KB
MD591c9623a9d02ecc37e33aefcb1a64342
SHA187fc3a0fd8189b61561cddaa049b0e18a5c9d40e
SHA2565eb0f19aca288acb444faf17502974f8a16254f2a2754933c6410dcd43325155
SHA5122514145ced516a401b38a269bee481b1179b2add3eda7a3e51e08f55ffd51c81ab0000d5afa26f162537eb52d79518224b1d05e95ad6e1025370163ca7295b70
-
Filesize
677KB
MD591c9623a9d02ecc37e33aefcb1a64342
SHA187fc3a0fd8189b61561cddaa049b0e18a5c9d40e
SHA2565eb0f19aca288acb444faf17502974f8a16254f2a2754933c6410dcd43325155
SHA5122514145ced516a401b38a269bee481b1179b2add3eda7a3e51e08f55ffd51c81ab0000d5afa26f162537eb52d79518224b1d05e95ad6e1025370163ca7295b70
-
Filesize
532KB
MD5ff1c65618d9eccd12e4671edc6aefa68
SHA1b67e2b1740374bb39f21d3bb2c5dfbb0250414e5
SHA256a98cef5fd8791f82f547d75ed3bd5de1f5a4bd3398801928e28b565c274cdaf0
SHA5123c2b03d4c071283fe92ab212b3d19f4a23bb397b9f008d7960ac9048653c1952bb8f6e0eec65ac10ababdcdd0b226f8946cd09c2ab37260236878bb4d802bc45
-
Filesize
532KB
MD5ff1c65618d9eccd12e4671edc6aefa68
SHA1b67e2b1740374bb39f21d3bb2c5dfbb0250414e5
SHA256a98cef5fd8791f82f547d75ed3bd5de1f5a4bd3398801928e28b565c274cdaf0
SHA5123c2b03d4c071283fe92ab212b3d19f4a23bb397b9f008d7960ac9048653c1952bb8f6e0eec65ac10ababdcdd0b226f8946cd09c2ab37260236878bb4d802bc45
-
Filesize
338KB
MD5cb2d93db92499f0d807e5de936216415
SHA16599f128b4914dfa7085a114f765f28ab2383366
SHA2568b784da006ef6549b3db738ed63352e81be6cf5941330388e02b72ec188c41f6
SHA512af7c64d82e6d728cbbaf73e39f3f5203a6a575e06dd8e847f937460df83aeadc1599d45e6edc1af35bef60ac899e369f96b181932e25bce850fe179a05e6ba66
-
Filesize
338KB
MD5cb2d93db92499f0d807e5de936216415
SHA16599f128b4914dfa7085a114f765f28ab2383366
SHA2568b784da006ef6549b3db738ed63352e81be6cf5941330388e02b72ec188c41f6
SHA512af7c64d82e6d728cbbaf73e39f3f5203a6a575e06dd8e847f937460df83aeadc1599d45e6edc1af35bef60ac899e369f96b181932e25bce850fe179a05e6ba66