Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-02-2023 12:52
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
737KB
-
MD5
8d013b4129e9f90f841a494190847b31
-
SHA1
53cefb2945a37889b5442cc45aea28dea8a5ac22
-
SHA256
5a53c1d7e6761dbe6b6ae5788cc6ffbbe78794d1eabc736251cce47c13ccfcc3
-
SHA512
c9152eb756d1d7ecf988c275365bb4bc4e7de7286a00893b9814d65bd6693e25be9509e1f3829db93bec629c6a9cec9252f645858bef0f6ee221b913da20dfbb
-
SSDEEP
12288:OS7vhV8dsyhucBzpzsr84zykKlj1tQowfxAiMNCXMfoufjuKLtnY3jIqP:VVEspUzxs4+Wlj1TZnJfo2TwEqP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Adventure.exe.pifpid process 1252 Adventure.exe.pif -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1760 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tmp.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" tmp.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
Processes:
tasklist.exetasklist.exepid process 2016 tasklist.exe 1716 tasklist.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Adventure.exe.pifpid process 1252 Adventure.exe.pif 1252 Adventure.exe.pif 1252 Adventure.exe.pif 1252 Adventure.exe.pif 1252 Adventure.exe.pif 1252 Adventure.exe.pif 1252 Adventure.exe.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
tasklist.exetasklist.exedescription pid process Token: SeDebugPrivilege 2016 tasklist.exe Token: SeDebugPrivilege 1716 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Adventure.exe.pifpid process 1252 Adventure.exe.pif 1252 Adventure.exe.pif 1252 Adventure.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Adventure.exe.pifpid process 1252 Adventure.exe.pif 1252 Adventure.exe.pif 1252 Adventure.exe.pif -
Suspicious use of WriteProcessMemory 44 IoCs
Processes:
tmp.execmd.execmd.exedescription pid process target process PID 1584 wrote to memory of 1864 1584 tmp.exe dllhost.exe PID 1584 wrote to memory of 1864 1584 tmp.exe dllhost.exe PID 1584 wrote to memory of 1864 1584 tmp.exe dllhost.exe PID 1584 wrote to memory of 1864 1584 tmp.exe dllhost.exe PID 1584 wrote to memory of 1484 1584 tmp.exe cmd.exe PID 1584 wrote to memory of 1484 1584 tmp.exe cmd.exe PID 1584 wrote to memory of 1484 1584 tmp.exe cmd.exe PID 1584 wrote to memory of 1484 1584 tmp.exe cmd.exe PID 1484 wrote to memory of 1760 1484 cmd.exe cmd.exe PID 1484 wrote to memory of 1760 1484 cmd.exe cmd.exe PID 1484 wrote to memory of 1760 1484 cmd.exe cmd.exe PID 1484 wrote to memory of 1760 1484 cmd.exe cmd.exe PID 1760 wrote to memory of 2016 1760 cmd.exe tasklist.exe PID 1760 wrote to memory of 2016 1760 cmd.exe tasklist.exe PID 1760 wrote to memory of 2016 1760 cmd.exe tasklist.exe PID 1760 wrote to memory of 2016 1760 cmd.exe tasklist.exe PID 1760 wrote to memory of 2028 1760 cmd.exe find.exe PID 1760 wrote to memory of 2028 1760 cmd.exe find.exe PID 1760 wrote to memory of 2028 1760 cmd.exe find.exe PID 1760 wrote to memory of 2028 1760 cmd.exe find.exe PID 1760 wrote to memory of 1716 1760 cmd.exe tasklist.exe PID 1760 wrote to memory of 1716 1760 cmd.exe tasklist.exe PID 1760 wrote to memory of 1716 1760 cmd.exe tasklist.exe PID 1760 wrote to memory of 1716 1760 cmd.exe tasklist.exe PID 1760 wrote to memory of 1764 1760 cmd.exe find.exe PID 1760 wrote to memory of 1764 1760 cmd.exe find.exe PID 1760 wrote to memory of 1764 1760 cmd.exe find.exe PID 1760 wrote to memory of 1764 1760 cmd.exe find.exe PID 1760 wrote to memory of 1912 1760 cmd.exe findstr.exe PID 1760 wrote to memory of 1912 1760 cmd.exe findstr.exe PID 1760 wrote to memory of 1912 1760 cmd.exe findstr.exe PID 1760 wrote to memory of 1912 1760 cmd.exe findstr.exe PID 1760 wrote to memory of 1252 1760 cmd.exe Adventure.exe.pif PID 1760 wrote to memory of 1252 1760 cmd.exe Adventure.exe.pif PID 1760 wrote to memory of 1252 1760 cmd.exe Adventure.exe.pif PID 1760 wrote to memory of 1252 1760 cmd.exe Adventure.exe.pif PID 1760 wrote to memory of 1168 1760 cmd.exe PING.EXE PID 1760 wrote to memory of 1168 1760 cmd.exe PING.EXE PID 1760 wrote to memory of 1168 1760 cmd.exe PING.EXE PID 1760 wrote to memory of 1168 1760 cmd.exe PING.EXE PID 1484 wrote to memory of 1200 1484 cmd.exe PING.EXE PID 1484 wrote to memory of 1200 1484 cmd.exe PING.EXE PID 1484 wrote to memory of 1200 1484 cmd.exe PING.EXE PID 1484 wrote to memory of 1200 1484 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\dllhost.exedllhost vfrfgh ningggfdee2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Chrome.pdf & ping -n 5 localhost2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"4⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"4⤵
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^kuSBdsbDhZNHQD$" Chicago.pdf4⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adventure.exe.pifAdventure.exe.pif I4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adventure.exe.pifFilesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Chicago.pdfFilesize
924KB
MD5aabe6813697af03369aa450bb4436f55
SHA16e2ab9fdebe157325f1e83318bfa502b83b164ad
SHA256969066f1533d7f8295294934cae842d6e04bf995347a926f59eab567554699a1
SHA512bc169c94564c22e40a446dd6c64de09f98bf09f6b0ec238ef252c29e1e2e9c10a0bef8cf8fca1192f5a7d4cd7afe4c4fa4597a3307b7c71916dda73d3fb2f188
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Chrome.pdfFilesize
11KB
MD5615333778325ed2e1d9deff0a5039a15
SHA140ab327c890707a9c9a5c2a10a6cdea8649a3341
SHA256dc5bc0a06f4879eb547f8be95543452755fc4bd84725e6637b37fd541ca21c1e
SHA5124359da53340dd931d38d268a7180f56c5ac1f88fe4e120dac7c13966a151f2d5d7331d9eeb5ee6d24bb4f3aa53f573bc3f7fe71e9eb148d8f808e0b2bb400b70
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Softball.pdfFilesize
598KB
MD506fd6f511cf200e7732d6e39caaab63f
SHA1b6215c6e20e9135743041559ef8d90f28ebbea5b
SHA25662aa5a27b09fc6b8573fc9ab0f0d6a8aacb1f8b2323525a5592a773b008fcdb5
SHA51257ecfbcd488136ab2adaca45cb7d2122275bdd7fc9b19bedaef5a06d45019b7a9a6b98e5f5f4df26e1cdd206552b38306bf4dd045bfdb7ab12224244f8a80d49
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\Adventure.exe.pifFilesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
memory/1168-68-0x0000000000000000-mapping.dmp
-
memory/1200-70-0x0000000000000000-mapping.dmp
-
memory/1252-69-0x0000000075241000-0x0000000075243000-memory.dmpFilesize
8KB
-
memory/1252-66-0x0000000000000000-mapping.dmp
-
memory/1484-55-0x0000000000000000-mapping.dmp
-
memory/1716-60-0x0000000000000000-mapping.dmp
-
memory/1760-57-0x0000000000000000-mapping.dmp
-
memory/1764-61-0x0000000000000000-mapping.dmp
-
memory/1864-54-0x0000000000000000-mapping.dmp
-
memory/1912-62-0x0000000000000000-mapping.dmp
-
memory/2016-58-0x0000000000000000-mapping.dmp
-
memory/2028-59-0x0000000000000000-mapping.dmp