Analysis
-
max time kernel
260s -
max time network
351s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:24
Static task
static1
Behavioral task
behavioral1
Sample
39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe
Resource
win10v2004-20230221-en
General
-
Target
39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe
-
Size
599KB
-
MD5
5c51ba6f5b3ecd92ae58cd0f5d540c86
-
SHA1
5be06b0c94b97c193ee15d375925080cd034b166
-
SHA256
39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68
-
SHA512
397f33530d24b406e53b173b60ca45d6d736a4110e501a071e13436b068520122fad862da47fad7cdc909b2dc2d6ac505e6928c1a93c1055bfa1ffaee440112c
-
SSDEEP
12288:2Mr+y90Fz/rwKcSLHzSSUX8FClTpCoOPXsqpH/vEb5NoVuJbLYZfzXvoLPG99Y:syu3wGTSSwuOTp1OPXz5oNowmfTge9a
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1636 y1897711.exe 1960 k5946007.exe -
Loads dropped DLL 4 IoCs
pid Process 868 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe 1636 y1897711.exe 1636 y1897711.exe 1960 k5946007.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1897711.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1897711.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 868 wrote to memory of 1636 868 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe 28 PID 868 wrote to memory of 1636 868 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe 28 PID 868 wrote to memory of 1636 868 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe 28 PID 868 wrote to memory of 1636 868 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe 28 PID 868 wrote to memory of 1636 868 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe 28 PID 868 wrote to memory of 1636 868 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe 28 PID 868 wrote to memory of 1636 868 39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe 28 PID 1636 wrote to memory of 1960 1636 y1897711.exe 29 PID 1636 wrote to memory of 1960 1636 y1897711.exe 29 PID 1636 wrote to memory of 1960 1636 y1897711.exe 29 PID 1636 wrote to memory of 1960 1636 y1897711.exe 29 PID 1636 wrote to memory of 1960 1636 y1897711.exe 29 PID 1636 wrote to memory of 1960 1636 y1897711.exe 29 PID 1636 wrote to memory of 1960 1636 y1897711.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe"C:\Users\Admin\AppData\Local\Temp\39f9a702e63ee55ee32bb7e769876d08a0af106821f2ad016771d2048f0d9f68.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1897711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1897711.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5946007.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5946007.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD57ff7b739031911d5c4fba0acbce631fd
SHA1b5055af71894fe6e9f985333c830a3dbf6ad1dc0
SHA256cc5b775dae68959d3fcf1e0bbaec601d5ee9158fd75c6af922821b42d3e75d97
SHA51238e1ebe6fae38328d688059868360c0d66665fbbce835d25e51370f97ef96e62c605c7d373d4d0b98908e8cd7ac4aae13b8674c1992ca43b9819567a008dd057
-
Filesize
307KB
MD57ff7b739031911d5c4fba0acbce631fd
SHA1b5055af71894fe6e9f985333c830a3dbf6ad1dc0
SHA256cc5b775dae68959d3fcf1e0bbaec601d5ee9158fd75c6af922821b42d3e75d97
SHA51238e1ebe6fae38328d688059868360c0d66665fbbce835d25e51370f97ef96e62c605c7d373d4d0b98908e8cd7ac4aae13b8674c1992ca43b9819567a008dd057
-
Filesize
136KB
MD59fcd35c3485c6b790f9cdfb223f24689
SHA19258aee61d521efe7aaf3bc5cd7204cc9167cb6c
SHA25608d32d8a45a66b8e72a9bbead0e4eabea8189338942c3c7c09132d6ed16ae023
SHA512107287e27f9bcb74906acc7e80941dee4e5a09150d9bacfbec2fa0c33d3b4c9f54b866f338d5cf0458237083e27c85cc329e796df752ab88c6af6f8e3c3894fe
-
Filesize
136KB
MD59fcd35c3485c6b790f9cdfb223f24689
SHA19258aee61d521efe7aaf3bc5cd7204cc9167cb6c
SHA25608d32d8a45a66b8e72a9bbead0e4eabea8189338942c3c7c09132d6ed16ae023
SHA512107287e27f9bcb74906acc7e80941dee4e5a09150d9bacfbec2fa0c33d3b4c9f54b866f338d5cf0458237083e27c85cc329e796df752ab88c6af6f8e3c3894fe
-
Filesize
307KB
MD57ff7b739031911d5c4fba0acbce631fd
SHA1b5055af71894fe6e9f985333c830a3dbf6ad1dc0
SHA256cc5b775dae68959d3fcf1e0bbaec601d5ee9158fd75c6af922821b42d3e75d97
SHA51238e1ebe6fae38328d688059868360c0d66665fbbce835d25e51370f97ef96e62c605c7d373d4d0b98908e8cd7ac4aae13b8674c1992ca43b9819567a008dd057
-
Filesize
307KB
MD57ff7b739031911d5c4fba0acbce631fd
SHA1b5055af71894fe6e9f985333c830a3dbf6ad1dc0
SHA256cc5b775dae68959d3fcf1e0bbaec601d5ee9158fd75c6af922821b42d3e75d97
SHA51238e1ebe6fae38328d688059868360c0d66665fbbce835d25e51370f97ef96e62c605c7d373d4d0b98908e8cd7ac4aae13b8674c1992ca43b9819567a008dd057
-
Filesize
136KB
MD59fcd35c3485c6b790f9cdfb223f24689
SHA19258aee61d521efe7aaf3bc5cd7204cc9167cb6c
SHA25608d32d8a45a66b8e72a9bbead0e4eabea8189338942c3c7c09132d6ed16ae023
SHA512107287e27f9bcb74906acc7e80941dee4e5a09150d9bacfbec2fa0c33d3b4c9f54b866f338d5cf0458237083e27c85cc329e796df752ab88c6af6f8e3c3894fe
-
Filesize
136KB
MD59fcd35c3485c6b790f9cdfb223f24689
SHA19258aee61d521efe7aaf3bc5cd7204cc9167cb6c
SHA25608d32d8a45a66b8e72a9bbead0e4eabea8189338942c3c7c09132d6ed16ae023
SHA512107287e27f9bcb74906acc7e80941dee4e5a09150d9bacfbec2fa0c33d3b4c9f54b866f338d5cf0458237083e27c85cc329e796df752ab88c6af6f8e3c3894fe