Analysis
-
max time kernel
19s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe
Resource
win10v2004-20230221-en
General
-
Target
67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe
-
Size
1.5MB
-
MD5
06eb386180d6cc1935db80f136a11f04
-
SHA1
ddac8724a355740963396195a32c5c8d85fb6274
-
SHA256
67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365
-
SHA512
1ccf44ef5f2c07f48c17a9769d9cd72dd8e0b3c25c212ad46ff7ea424749fee8ab7822567a286b72f5bddb87970631dccc1c8846c24fe60935a9833894936d2c
-
SSDEEP
24576:PyrvUijL5YUnpdt0ZNk3t4I2d/ueBN9eiD8hrCQBvMEcReZTF5Gjs3kH4nEOMpQD:arv1jL5YUpTuN+tlOueBNc75vMEcReZl
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 908 Li824575.exe 568 pp984960.exe 1800 TR799775.exe 828 176807278.exe -
Loads dropped DLL 8 IoCs
pid Process 1388 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 908 Li824575.exe 908 Li824575.exe 568 pp984960.exe 568 pp984960.exe 1800 TR799775.exe 1800 TR799775.exe 828 176807278.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce Li824575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Li824575.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce pp984960.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pp984960.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce TR799775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" TR799775.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 828 176807278.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1388 wrote to memory of 908 1388 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 28 PID 1388 wrote to memory of 908 1388 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 28 PID 1388 wrote to memory of 908 1388 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 28 PID 1388 wrote to memory of 908 1388 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 28 PID 1388 wrote to memory of 908 1388 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 28 PID 1388 wrote to memory of 908 1388 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 28 PID 1388 wrote to memory of 908 1388 67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe 28 PID 908 wrote to memory of 568 908 Li824575.exe 29 PID 908 wrote to memory of 568 908 Li824575.exe 29 PID 908 wrote to memory of 568 908 Li824575.exe 29 PID 908 wrote to memory of 568 908 Li824575.exe 29 PID 908 wrote to memory of 568 908 Li824575.exe 29 PID 908 wrote to memory of 568 908 Li824575.exe 29 PID 908 wrote to memory of 568 908 Li824575.exe 29 PID 568 wrote to memory of 1800 568 pp984960.exe 30 PID 568 wrote to memory of 1800 568 pp984960.exe 30 PID 568 wrote to memory of 1800 568 pp984960.exe 30 PID 568 wrote to memory of 1800 568 pp984960.exe 30 PID 568 wrote to memory of 1800 568 pp984960.exe 30 PID 568 wrote to memory of 1800 568 pp984960.exe 30 PID 568 wrote to memory of 1800 568 pp984960.exe 30 PID 1800 wrote to memory of 828 1800 TR799775.exe 31 PID 1800 wrote to memory of 828 1800 TR799775.exe 31 PID 1800 wrote to memory of 828 1800 TR799775.exe 31 PID 1800 wrote to memory of 828 1800 TR799775.exe 31 PID 1800 wrote to memory of 828 1800 TR799775.exe 31 PID 1800 wrote to memory of 828 1800 TR799775.exe 31 PID 1800 wrote to memory of 828 1800 TR799775.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe"C:\Users\Admin\AppData\Local\Temp\67ba44274a012d736ff3b89e369a6623db5948b8f188e5360067bb28f4b22365.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Li824575.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Li824575.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pp984960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pp984960.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TR799775.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\TR799775.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\176807278.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\176807278.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:828
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD58e1907fb69fcd02ecc75561454c485d5
SHA1ca4c280ab8d7f4c9fb099cae650f15c4d868dd3f
SHA256b0aaeb36e8c5a238c5bfe43e1beaa03e3c32b1748a9e63217274dc73ae080ca8
SHA5123961ce1be5c8b83d30860a75bc96409d4f48ab7b637f4c7bb1b0dbe846b7d70aca1b3518143f57fb1889bd00cf051e43d6bc2d395fce0ba696789f0c441309fd
-
Filesize
1.3MB
MD58e1907fb69fcd02ecc75561454c485d5
SHA1ca4c280ab8d7f4c9fb099cae650f15c4d868dd3f
SHA256b0aaeb36e8c5a238c5bfe43e1beaa03e3c32b1748a9e63217274dc73ae080ca8
SHA5123961ce1be5c8b83d30860a75bc96409d4f48ab7b637f4c7bb1b0dbe846b7d70aca1b3518143f57fb1889bd00cf051e43d6bc2d395fce0ba696789f0c441309fd
-
Filesize
871KB
MD5582eb9f88f85b08cd247f31be5eebc6c
SHA1086384151fa4ffb34ec6dfa56165739645e5976c
SHA256e6685e74a022cbb25dd69003e8705cf9fa296d1ca0dfa83dae37d6a3d71c2ee7
SHA5120db78e36d821d77260314abaec6f281b07dd0f35818646978569cadc4ac981c91de89b0e920d4875d53831d8a96005a6717c5cc00cf84eded206225da3077f9b
-
Filesize
871KB
MD5582eb9f88f85b08cd247f31be5eebc6c
SHA1086384151fa4ffb34ec6dfa56165739645e5976c
SHA256e6685e74a022cbb25dd69003e8705cf9fa296d1ca0dfa83dae37d6a3d71c2ee7
SHA5120db78e36d821d77260314abaec6f281b07dd0f35818646978569cadc4ac981c91de89b0e920d4875d53831d8a96005a6717c5cc00cf84eded206225da3077f9b
-
Filesize
700KB
MD540f4a9521d97abc6ff28062a9ec11707
SHA1fb2102fbd15ace3889e559d114e9d18304452aa9
SHA2562961b561e5fc8f51e51a56552173fd6770dc046d93bc48a5c6183b66f6274c65
SHA512d68e72802bbbadc31684bd000d51cf2f9de777f9a82c586dc08a499d46c7d3e2f2d305cf97570839c5423e3c6276c20236efa5c4dd8edd9c07c32e092106f095
-
Filesize
700KB
MD540f4a9521d97abc6ff28062a9ec11707
SHA1fb2102fbd15ace3889e559d114e9d18304452aa9
SHA2562961b561e5fc8f51e51a56552173fd6770dc046d93bc48a5c6183b66f6274c65
SHA512d68e72802bbbadc31684bd000d51cf2f9de777f9a82c586dc08a499d46c7d3e2f2d305cf97570839c5423e3c6276c20236efa5c4dd8edd9c07c32e092106f095
-
Filesize
300KB
MD550e65c6a0da3120534f802d2b2b67b2a
SHA1f168a3991abbd34b6bf87ef29f4e6cb14fa3ec9d
SHA256869604acc5691e0d5e3182d34187b4b948cd9286e5e45ffcedde96fdd5d01b98
SHA512fc32926c8bebcc62d5b38ac933cbad3e40ac76bc319d05fcc08f4f47e987d63a0fa6d43fb02e3e553789b58796a9c537e72068b18457d75b30b658f78415c10f
-
Filesize
300KB
MD550e65c6a0da3120534f802d2b2b67b2a
SHA1f168a3991abbd34b6bf87ef29f4e6cb14fa3ec9d
SHA256869604acc5691e0d5e3182d34187b4b948cd9286e5e45ffcedde96fdd5d01b98
SHA512fc32926c8bebcc62d5b38ac933cbad3e40ac76bc319d05fcc08f4f47e987d63a0fa6d43fb02e3e553789b58796a9c537e72068b18457d75b30b658f78415c10f
-
Filesize
1.3MB
MD58e1907fb69fcd02ecc75561454c485d5
SHA1ca4c280ab8d7f4c9fb099cae650f15c4d868dd3f
SHA256b0aaeb36e8c5a238c5bfe43e1beaa03e3c32b1748a9e63217274dc73ae080ca8
SHA5123961ce1be5c8b83d30860a75bc96409d4f48ab7b637f4c7bb1b0dbe846b7d70aca1b3518143f57fb1889bd00cf051e43d6bc2d395fce0ba696789f0c441309fd
-
Filesize
1.3MB
MD58e1907fb69fcd02ecc75561454c485d5
SHA1ca4c280ab8d7f4c9fb099cae650f15c4d868dd3f
SHA256b0aaeb36e8c5a238c5bfe43e1beaa03e3c32b1748a9e63217274dc73ae080ca8
SHA5123961ce1be5c8b83d30860a75bc96409d4f48ab7b637f4c7bb1b0dbe846b7d70aca1b3518143f57fb1889bd00cf051e43d6bc2d395fce0ba696789f0c441309fd
-
Filesize
871KB
MD5582eb9f88f85b08cd247f31be5eebc6c
SHA1086384151fa4ffb34ec6dfa56165739645e5976c
SHA256e6685e74a022cbb25dd69003e8705cf9fa296d1ca0dfa83dae37d6a3d71c2ee7
SHA5120db78e36d821d77260314abaec6f281b07dd0f35818646978569cadc4ac981c91de89b0e920d4875d53831d8a96005a6717c5cc00cf84eded206225da3077f9b
-
Filesize
871KB
MD5582eb9f88f85b08cd247f31be5eebc6c
SHA1086384151fa4ffb34ec6dfa56165739645e5976c
SHA256e6685e74a022cbb25dd69003e8705cf9fa296d1ca0dfa83dae37d6a3d71c2ee7
SHA5120db78e36d821d77260314abaec6f281b07dd0f35818646978569cadc4ac981c91de89b0e920d4875d53831d8a96005a6717c5cc00cf84eded206225da3077f9b
-
Filesize
700KB
MD540f4a9521d97abc6ff28062a9ec11707
SHA1fb2102fbd15ace3889e559d114e9d18304452aa9
SHA2562961b561e5fc8f51e51a56552173fd6770dc046d93bc48a5c6183b66f6274c65
SHA512d68e72802bbbadc31684bd000d51cf2f9de777f9a82c586dc08a499d46c7d3e2f2d305cf97570839c5423e3c6276c20236efa5c4dd8edd9c07c32e092106f095
-
Filesize
700KB
MD540f4a9521d97abc6ff28062a9ec11707
SHA1fb2102fbd15ace3889e559d114e9d18304452aa9
SHA2562961b561e5fc8f51e51a56552173fd6770dc046d93bc48a5c6183b66f6274c65
SHA512d68e72802bbbadc31684bd000d51cf2f9de777f9a82c586dc08a499d46c7d3e2f2d305cf97570839c5423e3c6276c20236efa5c4dd8edd9c07c32e092106f095
-
Filesize
300KB
MD550e65c6a0da3120534f802d2b2b67b2a
SHA1f168a3991abbd34b6bf87ef29f4e6cb14fa3ec9d
SHA256869604acc5691e0d5e3182d34187b4b948cd9286e5e45ffcedde96fdd5d01b98
SHA512fc32926c8bebcc62d5b38ac933cbad3e40ac76bc319d05fcc08f4f47e987d63a0fa6d43fb02e3e553789b58796a9c537e72068b18457d75b30b658f78415c10f
-
Filesize
300KB
MD550e65c6a0da3120534f802d2b2b67b2a
SHA1f168a3991abbd34b6bf87ef29f4e6cb14fa3ec9d
SHA256869604acc5691e0d5e3182d34187b4b948cd9286e5e45ffcedde96fdd5d01b98
SHA512fc32926c8bebcc62d5b38ac933cbad3e40ac76bc319d05fcc08f4f47e987d63a0fa6d43fb02e3e553789b58796a9c537e72068b18457d75b30b658f78415c10f