Analysis
-
max time kernel
140s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe
Resource
win10v2004-20230220-en
General
-
Target
3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe
-
Size
376KB
-
MD5
8b82dcd4258e70fe99cfc9017c97b67c
-
SHA1
9b120a9cd65a9660cbea61782d0c9c7d180a3655
-
SHA256
3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395
-
SHA512
ef3e5c3006399e2a6c4bf3fb11afd3b04c1a5dbbb9e509b8854177230165aa81921fc9f3103dbd06b4c402aad40c86258daf8b8e97d6c908c909ef6be2ec6973
-
SSDEEP
6144:K1y+bnr+fp0yN90QE7X7zbfzy+zH0tWKiamOdP/N967qtAbB+S1Ma6Vc+:7Mrry90h7fu+gEKiAk7qtAbYqMDVc+
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2000 x5275479.exe 1712 g0493495.exe -
Loads dropped DLL 4 IoCs
pid Process 2032 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe 2000 x5275479.exe 2000 x5275479.exe 1712 g0493495.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5275479.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5275479.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2000 2032 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe 26 PID 2032 wrote to memory of 2000 2032 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe 26 PID 2032 wrote to memory of 2000 2032 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe 26 PID 2032 wrote to memory of 2000 2032 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe 26 PID 2032 wrote to memory of 2000 2032 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe 26 PID 2032 wrote to memory of 2000 2032 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe 26 PID 2032 wrote to memory of 2000 2032 3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe 26 PID 2000 wrote to memory of 1712 2000 x5275479.exe 27 PID 2000 wrote to memory of 1712 2000 x5275479.exe 27 PID 2000 wrote to memory of 1712 2000 x5275479.exe 27 PID 2000 wrote to memory of 1712 2000 x5275479.exe 27 PID 2000 wrote to memory of 1712 2000 x5275479.exe 27 PID 2000 wrote to memory of 1712 2000 x5275479.exe 27 PID 2000 wrote to memory of 1712 2000 x5275479.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe"C:\Users\Admin\AppData\Local\Temp\3393e925480732e15e616ae5df5755ebae98ed2b9b2ea58cdfab8b20132e4395.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5275479.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5275479.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0493495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0493495.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5b5a5b117d5aff7e8ae12f14d4d27d3fc
SHA1db02da7fe049e213be127b2672e11524a76705a7
SHA256fe1ad78b85461b459043c393f7fe635c187c112fed3ac790dad4ea0f13f7ae12
SHA5121fb1e61f76aeb82b1719d872512a20a7975daa9e261ecd8215e30a500935b01e0613744edee898b0e32c707cdfa1bc4be312d7a505bb6c0d15db6c22b500b7dc
-
Filesize
204KB
MD5b5a5b117d5aff7e8ae12f14d4d27d3fc
SHA1db02da7fe049e213be127b2672e11524a76705a7
SHA256fe1ad78b85461b459043c393f7fe635c187c112fed3ac790dad4ea0f13f7ae12
SHA5121fb1e61f76aeb82b1719d872512a20a7975daa9e261ecd8215e30a500935b01e0613744edee898b0e32c707cdfa1bc4be312d7a505bb6c0d15db6c22b500b7dc
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
204KB
MD5b5a5b117d5aff7e8ae12f14d4d27d3fc
SHA1db02da7fe049e213be127b2672e11524a76705a7
SHA256fe1ad78b85461b459043c393f7fe635c187c112fed3ac790dad4ea0f13f7ae12
SHA5121fb1e61f76aeb82b1719d872512a20a7975daa9e261ecd8215e30a500935b01e0613744edee898b0e32c707cdfa1bc4be312d7a505bb6c0d15db6c22b500b7dc
-
Filesize
204KB
MD5b5a5b117d5aff7e8ae12f14d4d27d3fc
SHA1db02da7fe049e213be127b2672e11524a76705a7
SHA256fe1ad78b85461b459043c393f7fe635c187c112fed3ac790dad4ea0f13f7ae12
SHA5121fb1e61f76aeb82b1719d872512a20a7975daa9e261ecd8215e30a500935b01e0613744edee898b0e32c707cdfa1bc4be312d7a505bb6c0d15db6c22b500b7dc
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0