Analysis
-
max time kernel
321s -
max time network
350s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:41
Static task
static1
Behavioral task
behavioral1
Sample
9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe
Resource
win10v2004-20230221-en
General
-
Target
9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe
-
Size
1.2MB
-
MD5
ba90928dd8042ee77e5df1b93e40274f
-
SHA1
132a70a0120715c225ca9430a899681e96393400
-
SHA256
9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525
-
SHA512
52f5fef81010206dee074d47abaaf694e1d5cd127a512fa5c74ae830ce58eef7c31a24a721fa811a3bdb1d2bfa9fc164768b1fcc875bd13f7f61f6a1d78c7a13
-
SSDEEP
24576:IydZDVti4OzGfmKfb3hZHlK+OHFvsDUgVfodjAwzj3/wXlsJQoW/8L:PdpVti46OnT3XHlPOHJ+XVfmpjvw1smo
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
z62027351.exez12300861.exez92255667.exes47451374.exepid process 4112 z62027351.exe 1892 z12300861.exe 2340 z92255667.exe 1364 s47451374.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exez62027351.exez12300861.exez92255667.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z62027351.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z62027351.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z12300861.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z12300861.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z92255667.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z92255667.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s47451374.exedescription pid process Token: SeDebugPrivilege 1364 s47451374.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exez62027351.exez12300861.exez92255667.exedescription pid process target process PID 3748 wrote to memory of 4112 3748 9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe z62027351.exe PID 3748 wrote to memory of 4112 3748 9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe z62027351.exe PID 3748 wrote to memory of 4112 3748 9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe z62027351.exe PID 4112 wrote to memory of 1892 4112 z62027351.exe z12300861.exe PID 4112 wrote to memory of 1892 4112 z62027351.exe z12300861.exe PID 4112 wrote to memory of 1892 4112 z62027351.exe z12300861.exe PID 1892 wrote to memory of 2340 1892 z12300861.exe z92255667.exe PID 1892 wrote to memory of 2340 1892 z12300861.exe z92255667.exe PID 1892 wrote to memory of 2340 1892 z12300861.exe z92255667.exe PID 2340 wrote to memory of 1364 2340 z92255667.exe s47451374.exe PID 2340 wrote to memory of 1364 2340 z92255667.exe s47451374.exe PID 2340 wrote to memory of 1364 2340 z92255667.exe s47451374.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe"C:\Users\Admin\AppData\Local\Temp\9db89ee5936d4cae0e3dfd2db544843af796bf43e5a00768e00d2ed6f6127525.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z62027351.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z62027351.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z12300861.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z12300861.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z92255667.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z92255667.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s47451374.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s47451374.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z62027351.exeFilesize
1.0MB
MD5481d22095d3bb0ff46daa18c97c2b878
SHA1a218b3de8c8543615cabaade49837037301226cf
SHA256c9b05e9c3ee606b6af1fe28d090b077a4fd35dd3091108304362260e069adfc8
SHA51277ba6eb08a277c53172f556b3c1bc7a8448b7733905d1662e056d61c179173e6b80e401bdf79d5e5a26b6fd19840ae4bb8f698a0b71de36d3104b8f6942079bf
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z62027351.exeFilesize
1.0MB
MD5481d22095d3bb0ff46daa18c97c2b878
SHA1a218b3de8c8543615cabaade49837037301226cf
SHA256c9b05e9c3ee606b6af1fe28d090b077a4fd35dd3091108304362260e069adfc8
SHA51277ba6eb08a277c53172f556b3c1bc7a8448b7733905d1662e056d61c179173e6b80e401bdf79d5e5a26b6fd19840ae4bb8f698a0b71de36d3104b8f6942079bf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z12300861.exeFilesize
760KB
MD57e730bc26a0d6c327a80abb4c5fdb920
SHA127721cc8a8f9c544ce478b0368e9c0a73b85bf39
SHA256ebc9a2acfbbefef03142f21dea01d2fd5aa3ff5be16b7b1b89413e7f24ad96b0
SHA512192e3cd457fa55b74e9b9a960ef1e186df132b2e639d34eead0915b4b66b5d576f2794d9667fbe0017013cf64f72cd9a20dc0724c13ca7abc48c857acd7ff759
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z12300861.exeFilesize
760KB
MD57e730bc26a0d6c327a80abb4c5fdb920
SHA127721cc8a8f9c544ce478b0368e9c0a73b85bf39
SHA256ebc9a2acfbbefef03142f21dea01d2fd5aa3ff5be16b7b1b89413e7f24ad96b0
SHA512192e3cd457fa55b74e9b9a960ef1e186df132b2e639d34eead0915b4b66b5d576f2794d9667fbe0017013cf64f72cd9a20dc0724c13ca7abc48c857acd7ff759
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z92255667.exeFilesize
578KB
MD5a05596ae0274bce308a7ea7a375068dc
SHA130f7aede4fc6ef8419e4269c6489f9be439142e2
SHA2569bb95d8858e84bb5798a6439024f4b1c0f1d73a866db202b513401e529b29ea8
SHA5123b8eb91719ad639596a55b852f27133a2ff61c48a6b2ed172bfc05dabbeec480c562d6fdf3d61f977a1b5a996710c13787578ada304907070f9ae0021ace3686
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z92255667.exeFilesize
578KB
MD5a05596ae0274bce308a7ea7a375068dc
SHA130f7aede4fc6ef8419e4269c6489f9be439142e2
SHA2569bb95d8858e84bb5798a6439024f4b1c0f1d73a866db202b513401e529b29ea8
SHA5123b8eb91719ad639596a55b852f27133a2ff61c48a6b2ed172bfc05dabbeec480c562d6fdf3d61f977a1b5a996710c13787578ada304907070f9ae0021ace3686
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s47451374.exeFilesize
575KB
MD567c9a573f02ba562366bfc9995ac1909
SHA1446500cbf6e258fb35ebc602d3cdc926bd639c1e
SHA25609f385c1b1ecf005ab4b28b187bb510cfecddb2884355aa319a409c7392ff057
SHA51248a1440239adc8dd5d4c2793df94f14ff6d7773e74039c7d35ff0b3da70670540aadc608bf0d49a29a68de2ca7f1ba9332a2567702bc6ede8cbec9be32b6ac79
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s47451374.exeFilesize
575KB
MD567c9a573f02ba562366bfc9995ac1909
SHA1446500cbf6e258fb35ebc602d3cdc926bd639c1e
SHA25609f385c1b1ecf005ab4b28b187bb510cfecddb2884355aa319a409c7392ff057
SHA51248a1440239adc8dd5d4c2793df94f14ff6d7773e74039c7d35ff0b3da70670540aadc608bf0d49a29a68de2ca7f1ba9332a2567702bc6ede8cbec9be32b6ac79
-
memory/1364-162-0x0000000000910000-0x000000000096B000-memory.dmpFilesize
364KB
-
memory/1364-163-0x0000000000400000-0x0000000000835000-memory.dmpFilesize
4.2MB
-
memory/1364-164-0x0000000000910000-0x000000000096B000-memory.dmpFilesize
364KB
-
memory/1364-165-0x0000000000400000-0x0000000000835000-memory.dmpFilesize
4.2MB
-
memory/1364-167-0x0000000000400000-0x0000000000835000-memory.dmpFilesize
4.2MB
-
memory/1364-169-0x0000000005140000-0x00000000056E4000-memory.dmpFilesize
5.6MB
-
memory/1364-170-0x0000000005130000-0x0000000005140000-memory.dmpFilesize
64KB
-
memory/1364-171-0x0000000005130000-0x0000000005140000-memory.dmpFilesize
64KB
-
memory/1364-173-0x0000000005130000-0x0000000005140000-memory.dmpFilesize
64KB
-
memory/1364-174-0x0000000005130000-0x0000000005140000-memory.dmpFilesize
64KB
-
memory/1364-175-0x0000000005130000-0x0000000005140000-memory.dmpFilesize
64KB
-
memory/1364-176-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-177-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-179-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-181-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-183-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-185-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-187-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-189-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-191-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-193-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-195-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-197-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-199-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-201-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-203-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-205-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-207-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-209-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-211-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-213-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-215-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-217-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-219-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-221-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-223-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-225-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-227-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-229-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-231-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-233-0x0000000002B40000-0x0000000002BA0000-memory.dmpFilesize
384KB
-
memory/1364-2324-0x0000000005130000-0x0000000005140000-memory.dmpFilesize
64KB