Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 22:29
Static task
static1
Behavioral task
behavioral1
Sample
7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe
Resource
win10v2004-20230220-en
General
-
Target
7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe
-
Size
1.2MB
-
MD5
6b167374f39264956880174343f2be39
-
SHA1
35b12f9c031bff55c33589a073b056bae802a9d8
-
SHA256
7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096
-
SHA512
f554b1f53a4ae6d7cd6534dde0d55135713279a0d1cb7b48c9ec7dc4840c2acb8f223ed2e483d12ce4e4d20b3522408a478d31d00fe3d5fd872baf1631b9dd9b
-
SSDEEP
24576:KylXbAIQv4U/wVB1e863bh1UsYXlesp389DdC65YyK7+Fqoi93MiVHv:RlXbuiU863gVesd8VdCEK7+Fq9MO
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2040 x1295626.exe 552 x5963707.exe 880 g8901022.exe -
Loads dropped DLL 6 IoCs
pid Process 1300 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 2040 x1295626.exe 2040 x1295626.exe 552 x5963707.exe 552 x5963707.exe 880 g8901022.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1295626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1295626.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5963707.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5963707.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1300 wrote to memory of 2040 1300 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 26 PID 1300 wrote to memory of 2040 1300 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 26 PID 1300 wrote to memory of 2040 1300 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 26 PID 1300 wrote to memory of 2040 1300 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 26 PID 1300 wrote to memory of 2040 1300 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 26 PID 1300 wrote to memory of 2040 1300 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 26 PID 1300 wrote to memory of 2040 1300 7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe 26 PID 2040 wrote to memory of 552 2040 x1295626.exe 27 PID 2040 wrote to memory of 552 2040 x1295626.exe 27 PID 2040 wrote to memory of 552 2040 x1295626.exe 27 PID 2040 wrote to memory of 552 2040 x1295626.exe 27 PID 2040 wrote to memory of 552 2040 x1295626.exe 27 PID 2040 wrote to memory of 552 2040 x1295626.exe 27 PID 2040 wrote to memory of 552 2040 x1295626.exe 27 PID 552 wrote to memory of 880 552 x5963707.exe 28 PID 552 wrote to memory of 880 552 x5963707.exe 28 PID 552 wrote to memory of 880 552 x5963707.exe 28 PID 552 wrote to memory of 880 552 x5963707.exe 28 PID 552 wrote to memory of 880 552 x5963707.exe 28 PID 552 wrote to memory of 880 552 x5963707.exe 28 PID 552 wrote to memory of 880 552 x5963707.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe"C:\Users\Admin\AppData\Local\Temp\7061589d3ebf0bf0c3b9e241f8d15a2047b791d0d102ae3764b41c7a6e900096.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1295626.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5963707.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8901022.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:880
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
919KB
MD5fa3cd90e07be166f52e4199804cb51b4
SHA10441d5aded08ce8515fa51eb889193b6b16fc977
SHA256e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727
SHA512255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4
-
Filesize
919KB
MD5fa3cd90e07be166f52e4199804cb51b4
SHA10441d5aded08ce8515fa51eb889193b6b16fc977
SHA256e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727
SHA512255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4
-
Filesize
420KB
MD5fd494c79b7faedf40bd5861a7869e27a
SHA199015a410f7644b56f40014dfd95234ba77d2a24
SHA2561f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383
SHA512d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614
-
Filesize
420KB
MD5fd494c79b7faedf40bd5861a7869e27a
SHA199015a410f7644b56f40014dfd95234ba77d2a24
SHA2561f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383
SHA512d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614
-
Filesize
136KB
MD5dc26c0865ef6c13f8096d8c353e95f3e
SHA18e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05
SHA2564477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d
SHA5125e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264
-
Filesize
136KB
MD5dc26c0865ef6c13f8096d8c353e95f3e
SHA18e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05
SHA2564477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d
SHA5125e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264
-
Filesize
919KB
MD5fa3cd90e07be166f52e4199804cb51b4
SHA10441d5aded08ce8515fa51eb889193b6b16fc977
SHA256e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727
SHA512255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4
-
Filesize
919KB
MD5fa3cd90e07be166f52e4199804cb51b4
SHA10441d5aded08ce8515fa51eb889193b6b16fc977
SHA256e7a28c0653bcf73df854bb9a6d34ced165eb43cca66e9fd270a527b2e9336727
SHA512255407e1671ad6714c80beead5bb800e6a31312e70e984478486ce0913096a52922870a765839682a1ae02c8618eedcf237108f42ec93b42a60a5a5df11cecc4
-
Filesize
420KB
MD5fd494c79b7faedf40bd5861a7869e27a
SHA199015a410f7644b56f40014dfd95234ba77d2a24
SHA2561f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383
SHA512d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614
-
Filesize
420KB
MD5fd494c79b7faedf40bd5861a7869e27a
SHA199015a410f7644b56f40014dfd95234ba77d2a24
SHA2561f53cad4deb20ee61756c8789cb14ecc9275372deb6dc1090200a0d7a04ed383
SHA512d8ae2f7aa2ed48260f4ca91961b989d0827ac38098ad308154e9d82125b34078680c6fb842276dc6f67fd84be5b4d353d19988c3903f79a863f9c3e2a2ba7614
-
Filesize
136KB
MD5dc26c0865ef6c13f8096d8c353e95f3e
SHA18e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05
SHA2564477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d
SHA5125e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264
-
Filesize
136KB
MD5dc26c0865ef6c13f8096d8c353e95f3e
SHA18e3d965e691b8d083b3e8e9e1d9bbb1b45e23f05
SHA2564477068af770b10016fec97c67ab7b20cad33f733adbe0f9ac2cfc0798c07d9d
SHA5125e6a047e816b24b415ae54d7852bae31f48578014f832598364e8de3823bbfd66056b0bb3fea0690ae60b0631c78a401042d19d49501185d124988e959f1d264