Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe
Resource
win10v2004-20230220-en
General
-
Target
34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe
-
Size
376KB
-
MD5
10848a8b1717c589f3a62ac691b791d3
-
SHA1
b206d74cb2e8f0cf2aa0baa3ad6e07ab7813f6dc
-
SHA256
34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2
-
SHA512
79c219602f2b1106e2ca6e7d0b8b5009fed5d200d12b60aac03d2bbb99fa177b229d776891b9cd03722649ba524814d83bb7cd1764ae0e451153ef5b5cf826f8
-
SSDEEP
6144:Kjy+bnr+5p0yN90QEOWmE/LS5ca3CV/9NpuOxh6+hUvqPmaxuSryA:FMr5y90DmqeCjbh6TSPmFm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1092 x7435014.exe 1184 g9230100.exe -
Loads dropped DLL 4 IoCs
pid Process 816 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe 1092 x7435014.exe 1092 x7435014.exe 1184 g9230100.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7435014.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x7435014.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 816 wrote to memory of 1092 816 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe 27 PID 816 wrote to memory of 1092 816 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe 27 PID 816 wrote to memory of 1092 816 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe 27 PID 816 wrote to memory of 1092 816 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe 27 PID 816 wrote to memory of 1092 816 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe 27 PID 816 wrote to memory of 1092 816 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe 27 PID 816 wrote to memory of 1092 816 34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe 27 PID 1092 wrote to memory of 1184 1092 x7435014.exe 28 PID 1092 wrote to memory of 1184 1092 x7435014.exe 28 PID 1092 wrote to memory of 1184 1092 x7435014.exe 28 PID 1092 wrote to memory of 1184 1092 x7435014.exe 28 PID 1092 wrote to memory of 1184 1092 x7435014.exe 28 PID 1092 wrote to memory of 1184 1092 x7435014.exe 28 PID 1092 wrote to memory of 1184 1092 x7435014.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe"C:\Users\Admin\AppData\Local\Temp\34b578d3cdc3cf4ec9316712175c03a1a899ed5b52b71efae00168efb725ccc2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7435014.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7435014.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9230100.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9230100.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1184
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5ac48153276b443587a0f3e2cf3077070
SHA11184b4d37165352d7d28edd399d812c22dd2347b
SHA25647a69077827c13644adfb30663c1070ff42cd3f69c1da15a81ac84c9ef310639
SHA5124f325ccd4fd09a25dba5c05d11dada75679c8f0397dcd95762137d8dd632289991db0b45b1faf07879b74942c2bbeab5fd6922a769cb87a141719a6a416ef5d9
-
Filesize
204KB
MD5ac48153276b443587a0f3e2cf3077070
SHA11184b4d37165352d7d28edd399d812c22dd2347b
SHA25647a69077827c13644adfb30663c1070ff42cd3f69c1da15a81ac84c9ef310639
SHA5124f325ccd4fd09a25dba5c05d11dada75679c8f0397dcd95762137d8dd632289991db0b45b1faf07879b74942c2bbeab5fd6922a769cb87a141719a6a416ef5d9
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
204KB
MD5ac48153276b443587a0f3e2cf3077070
SHA11184b4d37165352d7d28edd399d812c22dd2347b
SHA25647a69077827c13644adfb30663c1070ff42cd3f69c1da15a81ac84c9ef310639
SHA5124f325ccd4fd09a25dba5c05d11dada75679c8f0397dcd95762137d8dd632289991db0b45b1faf07879b74942c2bbeab5fd6922a769cb87a141719a6a416ef5d9
-
Filesize
204KB
MD5ac48153276b443587a0f3e2cf3077070
SHA11184b4d37165352d7d28edd399d812c22dd2347b
SHA25647a69077827c13644adfb30663c1070ff42cd3f69c1da15a81ac84c9ef310639
SHA5124f325ccd4fd09a25dba5c05d11dada75679c8f0397dcd95762137d8dd632289991db0b45b1faf07879b74942c2bbeab5fd6922a769cb87a141719a6a416ef5d9
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0